added
stringdate
2025-04-01 04:05:38
2025-04-01 07:14:06
created
timestamp[us]date
2001-10-09 16:19:16
2025-01-01 03:51:31
id
stringlengths
4
10
metadata
dict
source
stringclasses
2 values
text
stringlengths
0
1.61M
2025-04-01T06:37:17.643336
2024-09-25T05:56:29
2547007209
{ "authors": [ "NadyaNayme" ], "license": "BSD-3-Clause", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2010", "repo": "NadyaNayme/job-gauges", "url": "https://github.com/NadyaNayme/job-gauges/issues/64" }
gharchive/issue
Font size should probably scale with UI Scale It might not make sense to scale the font 1:1 with scale as 300% scale would be a massive size 42 but perhaps at 50-75% of scale? The text is comically small at scales >200% and comically large for scales <80% that it completely obscures the image/icon behind the text. I believe Alt1 requires a whole number so maybe something like replacing the hardcoded 14 with Math.floor(14 * (scaleFactor * .6)) 75% of scaleFactor seems like an appropriate amount across all ranges using ceil() instead of floor() particularly so that the font is 1px larger for scale ranging between 50-100% where 1px is a lot more drastic of a difference than at 100%+ scale where 1px difference isn't as noticeable. Math.ceil(14 * (gaugeData.scaleFactor * 0.75))
2025-04-01T06:37:17.659651
2024-08-31T20:27:43
2499036260
{ "authors": [ "LeviSnoot", "Namo2", "alvitali", "loof2736" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2012", "repo": "Namo2/InPlayerEpisodePreview", "url": "https://github.com/Namo2/InPlayerEpisodePreview/issues/27" }
gharchive/issue
[bug] Breaks server discovery Started to get reports that people can't reach my Jellyfin instance and after some investigating it looks like this server causes the web client to lose track of where the server is. When users go to the domain for the instance they are greeted with No servers have been found using the automatic server discovery [Add server] Users can click the button and type the same base URL as they're visiting in to access the server again but this isn't intuitive or intended behavior. After digging around in my Nginx config and getting nowhere I tried disabling the last plugin I installed (this one) and everything instantly went back to normal. Hey, thanks for reporting this issue. Could you tell me on which clients this error appeared on? (Firefox, Chrome, Windows Client, ...) I've been getting this as well, it was happening to me on Firefox but I didn't test other browsers Actually I'm not sure if this is an issue with 10.9.10 or with this plugin, I found the same issue in the main Jellyfin repo here: https://github.com/jellyfin/jellyfin/issues/12523 Actually I'm not sure if this is an issue with 10.9.10 or with this plugin, I found the same issue in the main Jellyfin repo here: jellyfin/jellyfin#12523 I was the one who opened jellyfin/jellyfin#12523, and can confirm the issue was caused by the plugin, not Jellyfin 10.9.10 itself. Would love to see this resolved however, as I quite like the plugin! On a somewhat unrelated note - are there any plans to integrate the plugin into Jellyfin itself? As the functionality you provide is great :) @Namo2 I encountered this issue on all browsers I tested (Firefox & Edge on both Windows and macOS, Safari & Chrome on macOS). There is some more information including browser console logs provided by another user in the issue mentioned above That this error occurs on 10.9.10 is great information. I will try to fix it this weekend. Since the JMP version is not needed anymore I canceled my plans to integrate it to jellyfin but who knows what the future will bring. The possibility is still there of course but my focus will be on the bugs which are currently still open Since the JMP version is not needed anymore I canceled my plans to integrate it to jellyfin but who knows what the future will bring. The possibility is still there of course but my focus will be on the bugs which are currently still open Jellyfin Media Player (desktop app?) I'd love to see it for jellyfin-web anyways - I'm expecting some of the features of the web client to be implemented in the native apps too (e.g. trickplay preview, skipping segments in the future). Sorry for the thread unrelated to this issue - thanks for giving us this plugin, in any case! <3 Since the JMP version is not needed anymore I canceled my plans to integrate it to jellyfin but who knows what the future will bring. The possibility is still there of course but my focus will be on the bugs which are currently still open Jellyfin Media Player (desktop app?) I'd love to see it for jellyfin-web anyways - I'm expecting some of the features of the web client to be implemented in the native apps too (e.g. trickplay preview, skipping segments in the future). Sorry for the thread unrelated to this issue - thanks for giving us this plugin, in any case! <3 Hey the issue should be fixed now. Feel free to try it out and tell me if it works. Btw fyi, the trickplay preview is in the nativ desktop client
2025-04-01T06:37:17.663466
2020-11-04T18:38:02
736338307
{ "authors": [ "Nandaka", "jacobpewit" ], "license": "BSD-2-Clause", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2013", "repo": "Nandaka/PixivUtil2", "url": "https://github.com/Nandaka/PixivUtil2/issues/859" }
gharchive/issue
Error while trying to download from bookmarked members (/bookmark_new_illust.php) Prerequisites [X] Did you read FAQ section? [X] Did you test with the latest releases or commit ? Description When I try to download new illusts from bookmarked members (option 8) I get the following output: Processing New Illust from bookmark Page #1 Source URL: https://www.pixiv.net/bookmark_new_illust.php?p=1 Error at process_new_illust_from_bookmark(): (<class 'AttributeError'>, AttributeError("'NoneType' object has no attribute 'findAll'"), <traceback object at 0x1D168800>) Traceback (most recent call last): File "PixivUtil2.py", line 1604, in main np_is_valid, op_is_valid, selection = main_loop(ewd, op_is_valid, selection, np_is_valid, args) File "PixivUtil2.py", line 1320, in main_loop menu_download_new_illust_from_bookmark(op_is_valid, args) File "PixivUtil2.py", line 921, in menu_download_new_illust_from_bookmark process_new_illust_from_bookmark(page_num, end_page_num, r18) File "PixivUtil2.py", line 419, in process_new_illust_from_bookmark pb = PixivNewIllustBookmark(parsed_page) File "l:\PixivUtil2Python\PixivBookmark.py", line 102, in __init__ self.__ParseNewIllustBookmark(page) File "l:\PixivUtil2Python\PixivBookmark.py", line 120, in __ParseNewIllustBookmark result = page.find(attrs={'class': '_image-items autopagerize_page_element'}).findAll('a') AttributeError: 'NoneType' object has no attribute 'findAll' press enter to exit. Downloading by member_id and image_id seem to be working fine however. can you upload the html page from the given url in the logging? it should try to find js-mount-point-latest-following in script tag. Strangely, after changing my password & updating the cookie string back to the old cookie format used by pixiv, everything started working normally again.
2025-04-01T06:37:17.711620
2022-02-05T23:12:57
1125053077
{ "authors": [ "focusthenflex", "msa2984" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2014", "repo": "NarmathaBala/vsts-extension-retrospectives", "url": "https://github.com/NarmathaBala/vsts-extension-retrospectives/pull/40" }
gharchive/pull-request
[Tasks 1540, 1541] Add Snapshots and basic rendering tests Add basic tests, snapshots for noFeedbackBoardsView, editableText, and actionItemDisplay components Add test:watch command to allow faster test validation Add initial testing documentation to CONTRIBUTING.MD` @msa2984, Have no idea why, but the files I changed aren't recognizing the "mocks" file change, which is why this PR created today, instead of yesterday, so I added them directly to file. Wondering if you'd have better luck diagnosing/if you even see the issue when referencing the mocks. ➕ ➕ ➕ for updating the CONTRIBUTING doc to add testing info! Some notes for posterity before I merge this into the bigger PR: I swapped your tests over to Enzyme, this way we can remove the React-Test-Renderer dependency and all tests use the same framework. I re-generated the snapshots. It seems like the snapshots using Enzyme vs React-Test-Renderer are slightly different, however from comparing them they are both correct, just a slightly different way of rendering. I moved the shared mock calls into a setupTests.tsx file, this seems to be a much cleaner way of initializing the SDK + API mocks which are used by all of the more complex components. I added a reference to enzyme-to-json, as this seems like the recommended serializer for snapshot testing with enzyme. @msa2984, Have no idea why, but the files I changed aren't recognizing the "mocks" file change, which is why this PR created today, instead of yesterday, so I added them directly to file. Wondering if you'd have better luck diagnosing/if you even see the issue when referencing the mocks. I'm wondering if you were seeing an issue similar to what I was seeing - occasionally when I would add a new mock to that folder and reference it in my test, I would get various "Could not reference X of undefined" errors. Usually restarting VS Code would resolve the issue though, so I always figured that it was just a weird file detection error. Moving the shared API + SDK mocks into the setupTests.tsx seems to have resolved the failures I was seeing with your tests when I first checked out the branch.
2025-04-01T06:37:17.735022
2024-05-23T02:40:41
2311817407
{ "authors": [ "Natanaelel", "nitrofenix", "trunksbomb" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2016", "repo": "Natanaelel/TankStorage", "url": "https://github.com/Natanaelel/TankStorage/issues/1" }
gharchive/issue
Suggestions from Discord Keeping these in one place: nitrofenix: i'd base it on banks but maybe with half the amount of slots per tier trunksbomb: 8 buckets/16/64/256/1024/1000000 Tiers/capacities from the old mod (for reference/discussion only): 1: 3 tanks of 4000 mB each 2: 6 tanks of 16000 mB each 3: 9 tanks of 64000 mB each 4: 12 tanks of 256000 mB each 5: 15 tanks of 1024000 mB each 6: 18 tanks of 4096000 mB each 7: 27 tanks of 247483647 mB each Huh, would you look at that - I was pretty spot on for capacity :) Additional suggestions: Lockable slots Automatic pickup of fluids when standing in them? Probably not a good idea use the tank itself as the bucket (no dedicated bucket item like entangled buckets) shift + click air to change modes, shift + scroll while in "build" mode to change which liquid you're selecting definitely a "void" mode to void excess fluids maybe a sponge mode, or a mode that functions like a hose pulley from Create so you can target one block of fluid and have it suck up other blocks in the same body of water shift+click bucket of fluid in inventory while Tank GUI is open automatically inserts the fluid from that bucket, like Modern Industrialization machines Done so far: tank 1-7 and dock can interact with buckets/similar in gui including shift click can interact with pipes in world using dock can lock slots
2025-04-01T06:37:17.778585
2020-08-27T21:37:12
687559003
{ "authors": [ "NathanaelA", "kaustavlahiri" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2017", "repo": "NathanaelA/nativescript-sqlite", "url": "https://github.com/NathanaelA/nativescript-sqlite/issues/162" }
gharchive/issue
Point to custom Sqlite3 for paid extension support Is it possible to make nativescript-sqite use a custom bundled Sqlite3 instead of the default system one? We have a requirement to enable database encryption from the app (by using PRAGMA key = 'pwd'). For this to work we need to use a custom sqlite3.c file that has the SEE plugin. Initially we thought the paid nativescript-sqlite supports encryption but it turns out it can only decrypt? This plugin supports both encryption and decryption. You can already use PRAGMA key='...' PRAGMA key ='somekey' to set encryption on a non encrypted database does not work. If a database is already encrypted, I could decrypt with options:key and then add a new key with PRAGMA rekey = ''; Yes, you have to create a new database with encryption (which you can do with a create database command or ship a encrypted db). You are correct it won't encrypt a un-encrypted database, however you can work around by just create a new database and copy all data from the old database and then delete the old un-encrypted version. However, for security; if you are wanting to have encrypted db's it is better to start with a encrypted database rather than a unencrypted database. Thanks for confirming. What you are saying, is indeed one of my options: Ship an encrypted database with the app to begin with --> decrypt with your plugin --> rekey as needed. I would have to explore the other approach you suggested aka create a new encrypted database and then copy over stuff from the old unencrypted one. Although, I don't want to put all this script in the app code. So most likely I won't go with this option. Still its good to know that your plugin can create a new db with encryption turned on. Finally, just out of continued curiosity, is it possible to make use of a custom sqlite3 library in your plugin? The module.modulemap under platform/ios seems to specify the library. I was wondering if I could do something there to pick up my custom sqlite3.c? Well, we could build you a custom version with your sqlite3.c file; it is basically just building a new aar (on android) and framework on ios to be linked in and using them as the native part. The rest of the code base (like the JS) would work with no other changes; so it is really just creating new native libraries using he SEE version of sqlite instead of SqlCipher. Got it. Thats exactly what I was looking for. Infact, we have got around this use case by using open source SqlCipher to initially encrypt the database during the build phase and then use your paid plugin to decrypt and rekey as needed. So I am good now. Its still good to know that you can package a custom sqlite version, if needed. Thank you!
2025-04-01T06:37:17.846748
2020-08-29T17:26:04
688572451
{ "authors": [ "NathanaelA", "rigor789" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2018", "repo": "NativeScript/android-runtime", "url": "https://github.com/NativeScript/android-runtime/issues/1634" }
gharchive/issue
Update getAppResourcesPath() to use the new configs @NathanaelA we need to update these for 7.0 to read from the new config file. I think we should probably create a new CLI command that the gradle script can invoke and read the output - because the configs are no longer simple json files. As a quick fix, we could read the value with some regex (though that'd be easy to break in the configs - since it's js/ts). The current implementation could be kept as a fallback. https://github.com/NativeScript/android-runtime/blob/b10b6d625807f0d65dfebe2649cc37cfb124dd6e/test-app/gradle-helpers/paths.gradle#L19-L37 https://github.com/NativeScript/android-runtime/blob/f71130432d1fed102776bb8372906aadda82d3fe/test-app/app/build.gradle#L137-L157 @rigor789 - How about the CLI create the nsconfig.json file if the nsconfig.js file version of it exists; then no other tooling needs to change at this point, and it is then fully backwards compatible with older runtimes. Frequently we have people try using older runtimes to see when a issue has occurred; so breaking the CLI's compatibility should actually be fixed first... The goal and we are 99% there is to get rid of redundant configs, package.jsons, special keys etc. What I think we can/should do to keep older runtimes working, while not forcing an nsconfig.json on newer runtimes is to only generate the nsconfig.json when the runtime version is less than 7.0.0 and for 7 and above, we can add the new logic for reading the config value through the CLI.
2025-04-01T06:37:17.853799
2017-02-08T09:35:09
206141696
{ "authors": [ "NickIliev", "ivanbuhov", "xmlking" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2019", "repo": "NativeScript/ios-runtime", "url": "https://github.com/NativeScript/ios-runtime/issues/725" }
gharchive/issue
sample code to implement NativeScript Class in TypeScript with self delegate From @xmlking on February 7, 2017 18:3 I am new to NativeScript, looking for sample code to implement NativeScript Class in TypeScript with self delegate? here are more details : http://stackoverflow.com/questions/41991160/how-to-implement-nativescript-class-in-typescript-with-self-delegate want to simplify my code my eliminating additional delegate class by directly implementing delegate methods in the main class that supposed to have a delegate. Thanks Copied from original issue: NativeScript/NativeScript#3603 @xmlking As the doc says: There should be no TypeScript constructor, because it will not be executed. Instead override one of the init methods. You can override a base init method and place your delegate setting logic there: public init() { var self = this.super.init(); if (self) { self.delegate = self; } return self; } @ivanbuhov thanks for you input. my basic issue is I cannot inject Angular Service that extends NSObject with following case I am getting runtime error, either with JS constructor() or init() methods : file:///app/tns_modules/@angular/compiler/bundles/compiler.umd.js:18632:28: JS ERROR Error: Invalid provider for the NgModule 'MicrosoftBandModule' - only instances of Provider and Type are allowed, got: [?MicrosoftBandService?] import {Injectable} from '@angular/core'; @Injectable() export class MicrosoftBandService extends NSObject implements ConnectionDelegate { public static ObjCProtocols = [ConnectionDelegate]; ... } without extends NSObject the angular service will be registered properly. but native delegates has to always extend NSObject. Need to research how to register angular service provider that extend NSObject I tried following method, but this time I am getting undefined error :( CONSOLE ERROR file:///app/tns_modules/tns-core-modules/trace/trace.js:160:30: ns-renderer: Error in :0:0 caused by: undefined is not an object (evaluating 'this.msband.connection$.subscribe') export const MicrosoftBandToken = new OpaqueToken('MicrosoftBandToken'); @Injectable() export class MicrosoftBandService extends NSObject implements ConnectionDelegate { public static ObjCProtocols = [ConnectionDelegate]; static new(): MicrosoftBandService { let self = <MicrosoftBandService>super.new() self.mbk = MicrosoftBand.alloc().init(); if (self) { self.mbk.connectDelegate = self; } return self; } ... } import { MicrosoftBandToken, MicrosoftBandService } from './src/app/services/microsoftband.service.ios'; export class MicrosoftBandModule { static forRoot(): ModuleWithProviders { return { ngModule: MicrosoftBandModule, providers: [ {provide: MicrosoftBandToken, useValue: MicrosoftBandService.new()}, ] }; } } import {MicrosoftBandToken, MicrosoftBandService} from '@xmlking/nativescript-ngx-microsoftband'; @Component({ selector: 'app', templateUrl: "app.component.html" }) export class AppComponent implements OnInit, OnDestroy { constructor(private zone: NgZone, @Inject(MicrosoftBandToken) private msband: MicrosoftBandService) { } ... } @xmlking It seems that an angular service can't derive from native object. Try not to register your MicrosoftBandService as angular service just to verify that the original problem - implementing NativeScript Class in TypeScript with self delegate is solved. Then you can create a separate class for your angular service.
2025-04-01T06:37:17.860326
2020-10-19T16:14:43
724770036
{ "authors": [ "edusperoni", "jcarolus" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2020", "repo": "NativeScript/nativescript-angular", "url": "https://github.com/NativeScript/nativescript-angular/pull/2279" }
gharchive/pull-request
fix: Cannot reattach ActivatedRouteSnapshot created from a different … …route PR Checklist [x] The PR title follows our guidelines: https://github.com/NativeScript/NativeScript/blob/master/CONTRIBUTING.md#commit-messages. [x] There is an issue for the bug/feature this PR is for. To avoid wasting your time, it's best to open a suggestion issue first and wait for approval before working on it. [x] You have signed the CLA. [ ] All existing tests are passing: https://github.com/NativeScript/nativescript-angular/blob/master/DevelopmentWorkflow.md#running-the-tests [ ] Tests for the changes are included. What is the current behavior? Navigating between sibling routes may sometimes mess with the cache due to it using the key of a parent route, instead of the complete route. What is the new behavior? This now uses the correct key from the farthest children of the route PARTIALLY Fixes #1993. (this issue has 2 problems on it: 1 is the one fixed in this PR, the other is that route guard/resolvers don't work on back navigation and may break navigation for a PRO) Please don't merge this yet, as it seems it might not fully solve the issue @edusperoni @NathanaelA When debugging this issue in the use case Root => A => B, then back to A it looks like all keys to store/retrieve are generated correctly (also without this fix), but the error is still thrown. The expression that causes the error to be thrown (curr.value.routeConfig !== result.value.routeConfig in https://github.com/angular/angular/blob/3817e5f1dfeb9de26fa2ea4068a37565f435214f/packages/router/src/create_router_state.ts#L52) will actually show equal properties and values when inspecting, but are not the same object reference. This only occurs with lazy loaded modules (if changed to "regular" route configs it works). Perhaps the solution direction for this part of the issue is to either use a "deepEqual" instead of reference equality or to somehow make sure that the routeConfig reference stays the same for lazy loaded modules. Hope this helps, cheers.
2025-04-01T06:37:17.877453
2018-06-21T08:42:42
334394273
{ "authors": [ "abhayastudios", "aosi87", "aturan23", "lini" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2021", "repo": "NativeScript/nativescript-geolocation", "url": "https://github.com/NativeScript/nativescript-geolocation/issues/139" }
gharchive/issue
ZoneAwareError on with angular and iOS simulator I am using the plugin in a location.provider.ts whose saveUserLocation method (see code below) is called from my "home" page. Everything works find on Android and a real iOS device, however on the iOS simulator it most of the times gives me this error below and sometimes it just gives me the expected result (the location object). {"line":994,"column":38,"sourceURL":"file:///app/tns_modules/nativescript-angular/zone-js/dist/zone-nativescript.js","originalStack":"ZoneAwareError@file:///app/tns_modules/nativescript-angular/zone-js/dist/zone-nativescript.js:994:38\nfile:///app/tns_modules/nativescript-geolocation/geolocation.js:160:41\ninvoke@file:///app/tns_modules/tns-core-modules/timer/timer.js:54:53\nonInvoke@file:///app/tns_modules/@angular/core/bundles/core.umd.js:4787:39\nrunGuarded@file:///app/tns_modules/nativescript-angular/zone-js/dist/zone-nativescript.js:138:53\ntick@file:///app/tns_modules/tns-core-modules/timer/timer.js:19:26\nUIApplicationMain@[native code]\nstart@file:///app/tns_modules/tns-core-modules/application/application.js:258:26\nbootstrapApp@file:///app/tns_modules/nativescript-angular/platform-common.js:86:28\nbootstrapModule@file:///app/tns_modules/nativescript-angular/platform-common.js:72:26\nanonymous@file:///app/main.j Any idea as to what may cause this? I don't care too much if this happens only on the simulator, I am a little worried it might also happen on a real device even though I have not seen it yet. Thanks! Which platform(s) does your issue occur on? iOS simulator v10 Please, provide the following version numbers that your issue occurs with: $ tns info ✔ Getting NativeScript components versions information... ⚠ Update available for component nativescript. Your current version is 4.1.0 and the latest available version is 4.1.1. ⚠ Update available for component tns-core-modules. Your current version is 3.4.1 and the latest available version is 4.1.0. ⚠ Update available for component tns-android. Your current version is 3.4.2 and the latest available version is 4.1.3. ⚠ Update available for component tns-ios. Your current version is 3.4.1 and the latest available version is 4.1.1. { "description": "MyApp", "license": "SEE LICENSE IN <your-license-filename>", "readme": "NativeScript Application", "repository": "<fill-your-repository-here>", "nativescript": { "id": "com.abhayastudios.testapp", "tns-ios": { "version": "3.4.1" }, "tns-android": { "version": "3.4.2" } }, "dependencies": { "@angular/animations": "~5.2.0", "@angular/common": "~5.2.0", "@angular/compiler": "~5.2.0", "@angular/core": "~5.2.0", "@angular/forms": "~5.2.0", "@angular/http": "~5.2.0", "@angular/platform-browser": "~5.2.0", "@angular/platform-browser-dynamic": "~5.2.0", "@angular/router": "~5.2.0", "@teammaestro/nativescript-svg": "^1.0.1", "moment": "^2.18.1", "nativescript-angular": "~5.2.0", "nativescript-bitmap-factory": "^1.7.1", "nativescript-feedback": "^1.1.2", "nativescript-geolocation": "^4.2.6", "nativescript-gradient": "^2.0.1", "nativescript-image-swipe": "^2.1.0", "nativescript-imagepicker": "^5.0.0", "nativescript-iqkeyboardmanager": "^1.2.0", "nativescript-ngx-slides": "^1.0.0", "nativescript-platform-css": "^1.6.5", "nativescript-plugin-firebase": "^5.3.1", "nativescript-social-share": "^1.5.0", "nativescript-theme-core": "~1.0.4", "nativescript-ui-listview": "^3.5.0", "nativescript-webview-interface": "^1.4.1", "reflect-metadata": "~0.1.8", "rxjs": "~5.5.2", "tns-core-modules": "~3.4.1", "zone.js": "^0.8.16" }, "devDependencies": { "babel-traverse": "6.26.0", "babel-types": "6.26.0", "babylon": "6.18.0", "lazy": "1.0.11", "nativescript-dev-typescript": "~0.6.0", "typescript": "~2.6.2" } Is there any code involved? This the relevant part of my location.provider.ts: /* First obtain permissions to use location services if needed, then try to obtain user's location */ public saveUserLocation() { return new Promise((resolve, reject) => { geolocation.isEnabled().then((isEnabled:boolean) => { /* already have location permissions */ if (isEnabled) { this.getCurrentLocation().then((location) => { resolve(location); }, (error) => { reject(error); }); } else { /* first request location permissions */ geolocation.enableLocationRequest().then(() => { /* granted location permissions, now get location */ this.getCurrentLocation().then((location) => { resolve(location); }, (error) => { reject(error); }); }, (error) => { console.error(`Failed to obtain location permissions: ${JSON.stringify(error)}`); reject(error); }); } }) }); } /* Try to obtain user's location, assumes permissions are handled and save to user session if successful Returns promise containing location */ private getCurrentLocation() { return new Promise((resolve, reject) => { geolocation.getCurrentLocation({ desiredAccuracy: Accuracy.any, iosAllowsBackgroundLocationUpdates: false, maximumAge: 5000, // in milliseconds timeout: 5000, // in milliseconds }) .then((location) => { resolve(location); }, (error) => { console.error(`Failed to obtain user location: ${JSON.stringify(error)}`); reject(error); }); }); } I think the error means a timeout was exceeded while searching for a location (i.e. no GPS lock was obtained on the device). In your case the simulator did not return a location. You should be able to handle this in your code by increasing the timeout or prompting the user to retry when a GPS lock is available. You can also play with the iOS simulator settings and enable location from the Debug menu. @lini thanks for your reply. I have one of the Apple locations set in the simulator (which every now and then is obtained properly). Even increasing the timeout to 30k ms still results in the error above sometimes. I tried using the demo app from this repository and the debug location feature of the simulator. I clicked Enable Location then Start Monitoring and the updates on screen were consistent with the selected debug location: Can you try the demo app and see if there is a problem there for you? @lini I have same problem. I changed locations like you, but still not working. @lini Using the demo app I get the error below on the iOS simulator (with location set) when tapping once the Get Current Location button triggering the getCurrentLocation method. Yet at the same time the Start Monitoring button which triggers the watchLocation method displays locations just fine! app/main-page.js:57:20: Error: Timeout while searching for location! After changing the promise reject callback to log (error.message || error) instead of the entire object, indeed I get the same timeout message as with the demo app. Still, somehow there seems to be an issue with the getCurrentLocation on the iOS simulator. I will try to upgrade to the latest Xcode and see it the issue is solved. Still happening after upgrading to latest Xcode (now 9.4.1). Anyway, as long as this happens only on the simulator, it is not that important to me. This is still an issue, did you guys figure it out yet?
2025-04-01T06:37:17.884689
2014-10-14T15:09:03
45761636
{ "authors": [ "quicklizard99" ], "license": "bsd-3-clause", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2022", "repo": "NaturalHistoryMuseum/inselect", "url": "https://github.com/NaturalHistoryMuseum/inselect/issues/94" }
gharchive/issue
Hard-coded keyboard shortcuts in help text The keyboard shortcuts in the help text are hard-coded. This duplicates the information provided elsewhere in the code, making it possible for the help text and the application to get out of sync. #102 means that nearly all shortcuts are now documented in menus. Most of the text in Help, About is out of date. Suggest we remove Help, About and consider proper help pages in the future, if the need arises.
2025-04-01T06:37:17.891070
2021-06-26T10:40:31
930669191
{ "authors": [ "Hugo-ter-Doest", "vibl" ], "license": "mit", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2023", "repo": "NaturalNode/natural", "url": "https://github.com/NaturalNode/natural/issues/603" }
gharchive/issue
natural.DiceCoefficient does not compute the Dice coefficient Your algorithm count all bigram duplicates, whereas the Dice coefficient only count distinct bigrams. Please have a look at Talisman, NLTK or the algorithms in many languages in https://en.wikibooks.org/wiki/Algorithm_Implementation/Strings/Dice's_coefficient for a proper implementation. As an example, when comparing two Wikipedia articles with a Dice coefficient of 0.76, your algorithm outputs 0.42 (The two articles are the raw wikitext of https://en.wikipedia.org/wiki/French_Revolution and https://en.wikipedia.org/wiki/Influence_of_the_French_Revolution, you have to click on the Edit tab to get the wikitext). Thanks for your feedback. I created a new version of the Dice coefficient module based on the algorithms site you mentioned. I added support for strings of length 1 and made it case insensitive. Like in the original version.
2025-04-01T06:37:17.907622
2022-05-17T17:51:02
1238973967
{ "authors": [ "Ne00n", "devramsean0" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2024", "repo": "Ne00n/woodCDN", "url": "https://github.com/Ne00n/woodCDN/issues/12" }
gharchive/issue
IPV6 Does this CDN allow for ipv6? IPv6 is on ToDo on booth branches, so no. But should be possible to add.
2025-04-01T06:37:17.911259
2022-09-23T16:41:03
1384051349
{ "authors": [ "FeepingCreature", "dejlek" ], "license": "BSD-3-Clause", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2025", "repo": "Neat-Lang/neat", "url": "https://github.com/Neat-Lang/neat/pull/13" }
gharchive/pull-request
Now you can set LLVM_CONFIG when you run build.sh As the title says. What I needed was something like this to work: LLVM_CONFIG=/usr/bin/llvm-config-14 ./build.sh hooray
2025-04-01T06:37:17.923910
2017-04-21T04:50:11
223275435
{ "authors": [ "DavidVorick" ], "license": "mit", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2026", "repo": "NebulousLabs/Sia", "url": "https://github.com/NebulousLabs/Sia/pull/1734" }
gharchive/pull-request
New persist man... diff was too aggresive. json.go is a completely new file, jsonold.go is the old json.go, and if you want to read the code in a more sane way, you should just view it as a standalone file. Still writing more comprehensive tests, but I wanted to see how the checksum parser worked on Windows. I'm wondering if a different approach to newlines will screw up my byte-parsing. This PR is intended to address the file corruption error that has been occasionally wiping out users files after a hard shutdown. This new method has more safety around it, and notably does not use os.Rename at all to preserve safety.
2025-04-01T06:37:17.959394
2015-03-19T22:49:54
63108907
{ "authors": [ "kalta", "liveforeverx" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2029", "repo": "Nekso/nkbase", "url": "https://github.com/Nekso/nkbase/issues/2" }
gharchive/issue
Strong consistency support for ets "Strong consistency only support the leveldb backend currently." Do you have a plan to support ets backend in some future? Hi, Right now it does not make any sense, since the strong consistency backend (riak_ensemble) goes to disk for the tree.
2025-04-01T06:37:17.967743
2016-09-30T08:44:21
180251179
{ "authors": [ "VagishVela", "donofriov" ], "license": "mit", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2030", "repo": "Neo11/ChitChat", "url": "https://github.com/Neo11/ChitChat/issues/48" }
gharchive/issue
Task: Update readme with new emoji's that have been added. Some emoji's were fixed and some were added. Update the readme with the ones that were added from #44 @VagishVela it looks like the readme was updated as part of that PR already https://github.com/Neo11/ChitChat/pull/44/files -- Am I missing something? @donofriov Whoops my bad.
2025-04-01T06:37:17.992970
2024-04-25T20:26:52
2264433737
{ "authors": [ "CKolkey", "EarthyOrange", "asmodeus812" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2031", "repo": "NeogitOrg/neogit", "url": "https://github.com/NeogitOrg/neogit/issues/1260" }
gharchive/issue
Can't open multiple Neogit tabs in a window Description I want to open multiple Neogit tabs (https://neovim.io/doc/user/tabpage.html) in 1 Neovim window but every time I run the command :tab Neogit cwd=<git dir>, the new git directory is opened in the current tab. Therefore, I can run only 1 instance of Neogit in 1 window. Neovim version NVIM v0.9.4 Build type: Release LuaJIT 2.1.0-beta3 Operating system and version macOS 13.6.4 Steps to reproduce On terminal run nvim On nvim run :Neogit cwd=<git-dir-1> On nvim run :tab Neogit cwd=<git-dir-2> Expected behavior There should be 2 Neogit tabs pointing to respective git directories. Actual behavior On nvim run :Neogit cwd=<git-dir-1>: The current tab shows Neogit instance pointing to git-dir-1 On nvim run :tab Neogit cwd=<git-dir-2>: A new blank second tab is opened The first tab now points to git-dir-2 No tab points to git-dir-1 Minimal config -- NOTE: See the end of this file if you are reporting an issue, etc. Ignore all the "scary" functions up top, those are -- used for setup and other operations. local M = {} local base_root_path = vim.fn.fnamemodify(debug.getinfo(1, "S").source:sub(2), ":p:h") .. "/.min" function M.root(path) return base_root_path .. "/" .. (path or "") end function M.load_plugin(plugin_name, plugin_url) local package_root = M.root("plugins/") local install_destination = package_root .. plugin_name vim.opt.runtimepath:append(install_destination) if not vim.loop.fs_stat(package_root) then vim.fn.mkdir(package_root, "p") end if not vim.loop.fs_stat(install_destination) then print(string.format("> Downloading plugin '%s' to '%s'", plugin_name, install_destination)) vim.fn.system({ "git", "clone", "--depth=1", plugin_url, install_destination, }) if vim.v.shell_error > 0 then error(string.format("> Failed to clone plugin: '%s' in '%s'!", plugin_name, install_destination), vim.log.levels.ERROR) end end end ---@alias PluginName string The plugin name, will be used as part of the git clone destination ---@alias PluginUrl string The git url at which a plugin is located, can be a path. See https://git-scm.com/book/en/v2/Git-on-the-Server-The-Protocols for details ---@alias MinPlugins table<PluginName, PluginUrl> ---Do the initial setup. Downloads plugins, ensures the minimal init does not pollute the filesystem by keeping ---everything self contained to the CWD of the minimal init file. Run prior to running tests, reproducing issues, etc. ---@param plugins? table<PluginName, PluginUrl> function M.setup(plugins) vim.opt.packpath = {} -- Empty the package path so we use only the plugins specified vim.opt.runtimepath:append(M.root(".min")) -- Ensure the runtime detects the root min dir -- Install required plugins if plugins ~= nil then for plugin_name, plugin_url in pairs(plugins) do M.load_plugin(plugin_name, plugin_url) end end vim.env.XDG_CONFIG_HOME = M.root("xdg/config") vim.env.XDG_DATA_HOME = M.root("xdg/data") vim.env.XDG_STATE_HOME = M.root("xdg/state") vim.env.XDG_CACHE_HOME = M.root("xdg/cache") -- NOTE: Cleanup the xdg cache on exit so new runs of the minimal init doesn't share any previous state, e.g. shada vim.api.nvim_create_autocmd("VimLeave", { callback = function() vim.fn.system({ "rm", "-r", "-f", M.root("xdg") }) end }) end -- NOTE: If you have additional plugins you need to install to reproduce your issue, include them in the plugins -- table within the setup call below. M.setup({ plenary = "https://github.com/nvim-lua/plenary.nvim.git", telescope = "https://github.com/nvim-telescope/telescope.nvim", diffview = "https://github.com/sindrets/diffview.nvim", neogit = "https://github.com/NeogitOrg/neogit" }) -- WARN: Do all plugin setup, test runs, reproductions, etc. AFTER calling setup with a list of plugins! -- Basically, do all that stuff AFTER this line. require("neogit").setup({}) -- For instance, setup Neogit Not a bug - that's how it works on master. However, I've improved the experience a lot on the nightly branch, which will be released with nvim 0.10. Better CWD handling, that sort of thing. Try it out :) @CKolkey did try that myself, i have kind=tab, seems like if you already have an opened neogit status in a tab, if you call Neogit cwd=... again the neogit tab is not focused (but if you manually go to the tab it seems the state is updated). Tried on nightly with .setup() call. Is there a way allowing us to have multiple tabs opened for git status each for unique cwd ? I have a similar use case as the OP, where i might have multiple files from multiple working directories opened in the current nvim window. So instead of updaing the current neogit tab status if it exists, it will open a new tab for the cwd, if a tab for that cwd exists, then it can be focused and updated (working similarly to what is intended atm) - could be an opt in. Not sure how it would work with kind=split, but this could be only applicable for kind=tab wdyt ? It's going to require a bit of doing.. I use vim.uv.getcwd() all over to find the correct status buffer instance and repository object. I'm beginning to think that relying on that was a mistake in the first place as it's effectively a global variable. It's no issue to run git against a specific directory with the -C flag, but what I need to do is start passing the CWD into pretty much every constructor function, so it can either be consumed (run a git command) or passed on to a buffer that would consume it. Not a huge change, I think, but a bit tedious. However, it would mean that tabs/splits/whatever could point to a project directory and all coexist.
2025-04-01T06:37:18.001134
2024-05-29T19:38:16
2324111289
{ "authors": [ "CKolkey", "astrelinvl" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2032", "repo": "NeogitOrg/neogit", "url": "https://github.com/NeogitOrg/neogit/issues/1340" }
gharchive/issue
Error "Neogit has not been setup!" Description After adding the plugin to Lazy and using the :Neogit command, it gives the error: "Neogit has not been setup!" P.S. I'm new to neovim Neovim version NVIM v0.9.1 Build type: Release LuaJIT 2.1.0-beta3 Operating system and version macOs 13.1 (Ventura) m1 Steps to reproduce add the code to lua/plugins/neogit.lua: ` return { { "NeogitOrg/neogit", dependencies = { "nvim-lua/plenary.nvim", -- required "sindrets/diffview.nvim", -- optional - Diff integration -- Only one of these is needed, not both. "nvim-telescope/telescope.nvim", -- optional -- "ibhagwan/fzf-lua", -- optional }, cmd = "Neogit", config = true, }, } ` Go to a new terminal window Open a project Run the command :Neogit Expected behavior No response Actual behavior The error "Neogit has not been setup!" is displayed. Minimal config -- NOTE: See the end of this file if you are reporting an issue, etc. Ignore all the "scary" functions up top, those are -- used for setup and other operations. local M = {} local base_root_path = vim.fn.fnamemodify(debug.getinfo(1, "S").source:sub(2), ":p:h") .. "/.min" function M.root(path) return base_root_path .. "/" .. (path or "") end function M.load_plugin(plugin_name, plugin_url) local package_root = M.root("plugins/") local install_destination = package_root .. plugin_name vim.opt.runtimepath:append(install_destination) if not vim.loop.fs_stat(package_root) then vim.fn.mkdir(package_root, "p") end if not vim.loop.fs_stat(install_destination) then print(string.format("> Downloading plugin '%s' to '%s'", plugin_name, install_destination)) vim.fn.system({ "git", "clone", "--depth=1", plugin_url, install_destination, }) if vim.v.shell_error > 0 then error(string.format("> Failed to clone plugin: '%s' in '%s'!", plugin_name, install_destination), vim.log.levels.ERROR) end end end ---@alias PluginName string The plugin name, will be used as part of the git clone destination ---@alias PluginUrl string The git url at which a plugin is located, can be a path. See https://git-scm.com/book/en/v2/Git-on-the-Server-The-Protocols for details ---@alias MinPlugins table<PluginName, PluginUrl> ---Do the initial setup. Downloads plugins, ensures the minimal init does not pollute the filesystem by keeping ---everything self contained to the CWD of the minimal init file. Run prior to running tests, reproducing issues, etc. ---@param plugins? table<PluginName, PluginUrl> function M.setup(plugins) vim.opt.packpath = {} -- Empty the package path so we use only the plugins specified vim.opt.runtimepath:append(M.root(".min")) -- Ensure the runtime detects the root min dir -- Install required plugins if plugins ~= nil then for plugin_name, plugin_url in pairs(plugins) do M.load_plugin(plugin_name, plugin_url) end end vim.env.XDG_CONFIG_HOME = M.root("xdg/config") vim.env.XDG_DATA_HOME = M.root("xdg/data") vim.env.XDG_STATE_HOME = M.root("xdg/state") vim.env.XDG_CACHE_HOME = M.root("xdg/cache") -- NOTE: Cleanup the xdg cache on exit so new runs of the minimal init doesn't share any previous state, e.g. shada vim.api.nvim_create_autocmd("VimLeave", { callback = function() vim.fn.system({ "rm", "-r", "-f", M.root("xdg") }) end }) end -- NOTE: If you have additional plugins you need to install to reproduce your issue, include them in the plugins -- table within the setup call below. M.setup({ plenary = "https://github.com/nvim-lua/plenary.nvim.git", telescope = "https://github.com/nvim-telescope/telescope.nvim", diffview = "https://github.com/sindrets/diffview.nvim", neogit = "https://github.com/NeogitOrg/neogit" }) -- WARN: Do all plugin setup, test runs, reproductions, etc. AFTER calling setup with a list of plugins! -- Basically, do all that stuff AFTER this line. require("neogit").setup({}) -- For instance, setup Neogit I believe you want opts = {} instead of config = true :) I managed to remove this error by updating neovim to the latest version :-)
2025-04-01T06:37:18.061334
2019-10-05T05:54:57
502921126
{ "authors": [ "guyjacob", "hoseung2" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2033", "repo": "NervanaSystems/distiller", "url": "https://github.com/NervanaSystems/distiller/issues/398" }
gharchive/issue
Quantization dequanitze flag Hi, while looking at the quantization function I found that there is a dequantize flag. But as I think, the network should be forwarded to the dequantized value. What's the purpose of the dequantize flag? In other words, what's the difference between dequantized and non-dequantized cases? Thank you. I'm not sure what you mean by "the network should be forwarded to the dequantized value", but in any case, this is a utility function called from many places: In some cases we want to just get the effect of quantization but still let the model run with float tensors (aka "fake-quantization"). This is common in quantization-aware training scenarios. In these cases we'll set dequantize=True. In other cases we want to quantize a tensor and keep working on the quantized values. This happens in post-training quantization. That's what I exactly wanted to know. Thank you so much
2025-04-01T06:37:18.066498
2019-07-15T04:58:29
467941195
{ "authors": [ "aprocter", "nmostafa" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2034", "repo": "NervanaSystems/ngraph", "url": "https://github.com/NervanaSystems/ngraph/pull/3225" }
gharchive/pull-request
[MLIR] Concat Adds support for Concat to MLIR compiler/lowerer. All but two tests in CPU.concat* are passing. The two that are failing are triggering this check in compiled_kernel.cpp: https://github.com/NervanaSystems/ngraph/blob/3f6cda4c22636fb5c0b7d2038eb4676712504671/src/ngraph/op/experimental/compiled_kernel.cpp#L78 I think this failure is unrelated to this PR, other than the fact that this PR exposes these tests to the MLIR/compiled_kernel machinery. Example dump thru affine dialect: [ RUN ] CPU.concat_5d *** nGraph Dialect Dump: *** func @main(%arg0: !ng.tensor<2x3x3x3x2xf32>, %arg1: !ng.tensor<2x3x2x3x2xf32>, %arg2: !ng.tensor<2x3x4x3x2xf32>) -> !ng.tensor<2x3x9x3x2xf32> { %0 = "ng.concat"(%arg2, %arg0, %arg1) {concatenation_axis = 2 : i64} : (!ng.tensor<2x3x4x3x2xf32>, !ng.tensor<2x3x3x3x2xf32>, !ng.tensor<2x3x2x3x2xf32>) -> !ng.tensor<2x3x9x3x2xf32> "ng.return"(%0) : (!ng.tensor<2x3x9x3x2xf32>) -> () } *** Affine Dialect Dump: *** #map0 = () -> (0) #map1 = () -> (2) #map2 = () -> (3) #map3 = () -> (4) #map4 = (d0) -> (d0 + 4) #map5 = (d0) -> (d0 + 7) func @main(%arg0: memref<2x3x3x3x2xf32>, %arg1: memref<2x3x2x3x2xf32>, %arg2: memref<2x3x4x3x2xf32>, %arg3: memref<2x3x9x3x2xf32>, %arg4: index) { affine.for %i0 = 0 to 2 { affine.for %i1 = 0 to 3 { affine.for %i2 = 0 to 4 { affine.for %i3 = 0 to 3 { affine.for %i4 = 0 to 2 { %0 = load %arg2[%i0, %i1, %i2, %i3, %i4] : memref<2x3x4x3x2xf32> store %0, %arg3[%i0, %i1, %i2, %i3, %i4] : memref<2x3x9x3x2xf32> } } } } } affine.for %i5 = 0 to 2 { affine.for %i6 = 0 to 3 { affine.for %i7 = 0 to 3 { %1 = affine.apply #map4(%i7) affine.for %i8 = 0 to 3 { affine.for %i9 = 0 to 2 { %2 = load %arg0[%i5, %i6, %i7, %i8, %i9] : memref<2x3x3x3x2xf32> store %2, %arg3[%i5, %i6, %1, %i8, %i9] : memref<2x3x9x3x2xf32> } } } } } affine.for %i10 = 0 to 2 { affine.for %i11 = 0 to 3 { affine.for %i12 = 0 to 2 { %3 = affine.apply #map5(%i12) affine.for %i13 = 0 to 3 { affine.for %i14 = 0 to 2 { %4 = load %arg1[%i10, %i11, %i12, %i13, %i14] : memref<2x3x2x3x2xf32> store %4, %arg3[%i10, %i11, %3, %i13, %i14] : memref<2x3x9x3x2xf32> } } } } } return } You can remove the compiled_kernel assert. It is left-over from previous purpose of that node. Nodes obviously don't need to be of same type/shape. @dcaballe Regarding tests: $ NGRAPH_MLIR=1 test/unit-test --gtest_filter='CPU.*concat*' Note: Google Test filter = CPU.*concat* [==========] Running 16 tests from 1 test case. [----------] Global test environment set-up. [----------] 16 tests from CPU [ RUN ] CPU.concat_matrix_colwise [ OK ] CPU.concat_matrix_colwise (12 ms) [ RUN ] CPU.concat_matrix_rowwise [ OK ] CPU.concat_matrix_rowwise (9 ms) [ RUN ] CPU.concat_matrix_int64 [ OK ] CPU.concat_matrix_int64 (8 ms) [ RUN ] CPU.concat_vector [ OK ] CPU.concat_vector (6 ms) [ RUN ] CPU.concat_4d_tensor [ OK ] CPU.concat_4d_tensor (9 ms) [ RUN ] CPU.concat_2d_tensor [ OK ] CPU.concat_2d_tensor (7 ms) [ RUN ] CPU.concat_in_place_2d_tensor [ OK ] CPU.concat_in_place_2d_tensor (9 ms) [ RUN ] CPU.concat_in_place_propagate_2d_tensor /localdisk/amprocte/Work/ngraph/build/test/backend_test_CPU.cpp:1031: Failure Value of: test::all_close_f( (vector<float>{3, 7, 2}), read_vector<float>(result), MIN_FLOAT_TOLERANCE_BITS) Actual: false (7 is not close to 2 at index 1 2 is not close to 0 at index 2 diff count: 2 out of 3 passing criteria - mismatch allowed @ mantissa bit: 24 or later (0 tolerance bits) 0 value(s) below min_signal: 0 tightest match - mismatch occurred @ mantissa bit: 24 or next bit (3 vs 3 at [0]) loosest match - mismatch occurred @ mantissa bit: 0 or next bit (2 vs 0 at [2]) median match - mismatch occurred @ mantissa bit: 0 or next bit ) Expected: true [ FAILED ] CPU.concat_in_place_propagate_2d_tensor (9 ms) [ RUN ] CPU.concat_5d [ OK ] CPU.concat_5d (53 ms) [ RUN ] CPU.concat_zero_length_1d_last [ OK ] CPU.concat_zero_length_1d_last (5 ms) [ RUN ] CPU.concat_zero_length_1d_middle [ OK ] CPU.concat_zero_length_1d_middle (5 ms) [ RUN ] CPU.concat_zero_zero [ OK ] CPU.concat_zero_zero (1 ms) [ RUN ] CPU.concat_zero_length_4d_middle [ OK ] CPU.concat_zero_length_4d_middle (9 ms) [ RUN ] CPU.backwards_concat_vector [ OK ] CPU.backwards_concat_vector (8 ms) [ RUN ] CPU.backwards_concat_axis_0 [ OK ] CPU.backwards_concat_axis_0 (11 ms) [ RUN ] CPU.backwards_concat_axis_1 [ OK ] CPU.backwards_concat_axis_1 (134 ms) [----------] 16 tests from CPU (295 ms total) [----------] Global test environment tear-down [==========] 16 tests from 1 test case ran. (296 ms total) [ PASSED ] 15 tests. [ FAILED ] 1 test, listed below: [ FAILED ] CPU.concat_in_place_propagate_2d_tensor 1 FAILED TEST 17:33:02.208622: [MAIN] Tests finished: Time: 297 ms Exit code: 1 With NGRAPH_MLIR_DUMP_ALL=1, all the above are dumping reasonable-looking affine code. The failed test is probably due to the issue we've been discussing on Slack. @dcaballe @nmostafa I think comments are addressed at this point. Let me know.
2025-04-01T06:37:18.076764
2023-02-15T20:05:38
1586479805
{ "authors": [ "Hardikl", "cgrinds" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2035", "repo": "NetApp/harvest", "url": "https://github.com/NetApp/harvest/issues/1738" }
gharchive/issue
Revisit counter dash to underscore replacement logic As raised by jfong on Discord This logic happens here Replacement of dash to underscore happens automatically when you don't use the rename => marker, and yes, that behavior is used extensively in zapi templates. Perhaps the idea is if you rename, you get the final call to decide on the name (even if it's wrong). That may be questionable 🙂 As noted Prometheus does not permit dashes - in labels. ONTAP REST documentation states: However, REST converts hyphens - in CLI parameter names to underscores _ in the REST API JSON response body. We have investigated on this issue and below is the summary: --> Prometheus would not supporting the hyphen (-) in metric/label names and erroring out, Whereas InfluxDB can support the hyphen(-). --> Harvest's behaviour would be if we have the rename marker => in the template, then Harvest will honour that display name as-is. If we don't have the rename marker => in template, then Harvest will try to help and generate display name accordingly. The solution which we all are agreed on is, if the rename marker => exist in template, Then Harvest should not intervene and honour the display name as-is.
2025-04-01T06:37:18.090022
2017-04-25T21:06:18
224272212
{ "authors": [ "whonow" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2036", "repo": "NetDocuments/ad-join-cookbook", "url": "https://github.com/NetDocuments/ad-join-cookbook/issues/24" }
gharchive/issue
Need help Now my screen rotated on my laptop My Toshiba laptop his rotated the screen upside down by its self
2025-04-01T06:37:18.130548
2016-12-07T15:46:33
194085021
{ "authors": [ "karteeksaragad", "mattrjacobs", "mohamedanees", "prakhar241" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2037", "repo": "Netflix/Hystrix", "url": "https://github.com/Netflix/Hystrix/issues/1436" }
gharchive/issue
Question regarding maximumSize and coreSize I have set the maximum size of thread pool to be 10 and the core size as 2. The requests are getting queued(if more than 2 requests are made) instead of creating a new thread on the threadpool. As far as my knowledge, the thread pool must support 10 threads to the maximum and then queue the subsequent requests. If the number of requests is less, and the other 8 threads on the threadpool are not assigned any tasks,then they must wait for utmost 1 minute to get destroyed (But the thread pool will still contain 2 daemon threads even if no requests are made). But this is not happening in my case. Kindly advise if my understanding is right! Can you retry with 1.5.9 (just released)? If the issue still exists, I can dig in. @mattrjacobs Still this issue is persisting. I tried using 1.5.9. Kindly suggest. Can you inspect the configuration of the running system to see what values are being used? You can use the Hystrix configuration stream or do something manual by inspecting Hystrix objects and logging values out. Hi @mattrjacobs, Thanks for your help all the way,its working fine with latest version. I forgot to reconfigure after updating the hystrix jar to 1.5.9. Closing this issue 👍 @mohamedanees : I have the same problem with dynamic hystrix thread pool settings, not working expected. I am using hystrix 1.5.12 (maximumSize=100, coreSize=60 and allowMaximumSizeToDivergeFromCoreSize=true). Can you let me know what is that you forgot to reconfigure to fix the issue??? @karteeksaragad - I'm facing similar issue with 1.5.12. Did it work for you? @mattrjacobs
2025-04-01T06:37:18.139452
2015-09-09T21:09:13
105685066
{ "authors": [ "cloudbees-pull-request-builder", "mattrjacobs" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2038", "repo": "Netflix/Hystrix", "url": "https://github.com/Netflix/Hystrix/pull/886" }
gharchive/pull-request
Only lookup if the request cache is enabled once per command invocation This helps performance and eliminates chance that start/end of command see this value differently NetflixOSS » Hystrix » Hystrix-pull-requests #169 SUCCESS This pull request looks good
2025-04-01T06:37:18.141484
2015-09-15T23:42:28
106669822
{ "authors": [ "cloudbees-pull-request-builder", "scottmcmaster" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2039", "repo": "Netflix/Priam", "url": "https://github.com/Netflix/Priam/pull/421" }
gharchive/pull-request
Upgrade tests to use JMockit 1.19, which is compatible with newer ver… …sions of Java; also fix CassandraAdminTest failure caused as regression in 49865ab. Addresses the comment in issue #415 NetflixOSS » Priam » Priam-pull-requests #25 SUCCESS This pull request looks good Priam-pull-requests #187 SUCCESS This pull request looks good
2025-04-01T06:37:18.142453
2024-02-27T13:47:15
2156638904
{ "authors": [ "mtb0x1", "nickodell" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2040", "repo": "Netflix/bpftop", "url": "https://github.com/Netflix/bpftop/pull/12" }
gharchive/pull-request
fix: avoid crash when navigation keys used with an empty console using navigation keys (up, down) with an empty console results in a panic with out-of-band error. @mtb0x1 Thanks for this fix. I ran into the same problem.
2025-04-01T06:37:18.144865
2020-11-02T21:28:57
734836186
{ "authors": [ "apanicker-nflx", "djcass44", "rmohta" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2041", "repo": "Netflix/conductor", "url": "https://github.com/Netflix/conductor/issues/1952" }
gharchive/issue
go client: No Domain when polliing for task When using go client with an empty string domain, it's creating below GET call, which I think Conductor server does not like. Removing domain=& from the call works for polling. Is this is a known bug? 2020/11/02 14:19:23 Sending [ GET ] request to Server ( http://localhost:8080/api/tasks/poll/get_model?workerid=C02&domain=& ): 2020/11/02 14:19:23 Body: 2020/11/02 14:19:23 2020/11/02 14:19:24 Received response from Server ( http://localhost:8080/api ): 2020/11/02 14:19:24 Status: 204 No Content 2020/11/02 14:19:24 Response: 2020/11/02 14:19:24 Go client github.com/netflix/conductor/client/go v0.0.0-20201029170655-6bce3912d3ce @djcass44 Could you please help with this potential issue in the go client? Thank you. @apanicker-nflx I've implemented a possible fix in #1976, are you able to take a look?
2025-04-01T06:37:18.159628
2023-09-20T16:45:52
1905377746
{ "authors": [ "whitdog47", "wssheldon" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2042", "repo": "Netflix/dispatch", "url": "https://github.com/Netflix/dispatch/pull/3795" }
gharchive/pull-request
Timeline enhancements This PR includes many enhancements to the incident timeline, including: Direct link to the timeline for an incident. Users can now browse to .../{org_name}/incidents/{incident_name}/timeline to open the incident view directly to the timeline. The incident details view pane is now expandable by a click and drag on the vertical divider line. Icons in the timeline bubbles quickly indicate the type of event. The incident timeline now has filtering to show/hide different kinds of events, with system events hidden by default. Users can now add custom events to the timeline directly in the UI by hovering between existing events in the timeline and click the "Add event" button. Custom events can be edited and/or deleted by the incident commander or reporter. Messages imported from Slack with the reaction event can now be edited and/or deleted by the incident commander or reporter. One thing that stands out form a UX perspective in the timeline is user actions vs system actions look very similar. I think it'd help to differentiate them more. For example, the icon for the user actions could be the users profile picture and names could be bolded/clickable with the user popover component we have. A minor thing from last screenshot -- the delete / edit icons probably fit best positioned all the way right, under the date. that way they wont cover the text or interfere with the content if it is rich (hoverable/clickable) in the future One thing that stands out form a UX perspective in the timeline is user actions vs system actions look very similar. I think it'd help to differentiate them more. For example, the icon for the user actions could be the users profile picture and names could be bolded/clickable with the user popover component we have. Will pull these ideas into a phase 2, which will align the entire Incident edit/view with the new Case UI.
2025-04-01T06:37:18.164080
2020-03-19T17:22:10
584574408
{ "authors": [ "savingoyal", "themantalope" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2043", "repo": "Netflix/metaflow", "url": "https://github.com/Netflix/metaflow/issues/162" }
gharchive/issue
link two flows Not sure if I just haven't found the right verbage in the documentations, or if there are other built in ways to do this but I want to be able to prospectively link two flows together. For example, let's say there is FlowA and FlowB, and FlowA for example pre-processes data that gets utilized in FlowB. Is there a way I can make sure that I know which data from FlowA was utilized by a certain run in FlowB? One way I guess would be to tag both flows with the same tag or unique ID, does anyone know how to programmatically tag a flow within itself? Should I just combine the two flows into one? Thanks @themantalope Tagging is definitely one approach. How are you currently accessing data from FlowA in your FlowB? You could simply store the relevant run id for FlowA in FlowB and access it using the Client API. We have #159 open which will provide programmatic capabilities for tagging a flow retrospectively. I see, so in the first step of FlowB I could do something link from metaflow import FlowSpec, Flow class FlowB(FlowSpec): @step def start(self): self.last_flow_a_run_id = Flow('FlowA').latest_run.run_id // rest of code etc. And when the data from the FlowB is stored, the data in last_flow_a_run_id will get saved to disk, correct? Yep, correct. Great! Really appreciate it!
2025-04-01T06:37:18.170291
2019-12-10T14:01:29
535749389
{ "authors": [ "jasonmit", "offirgolan", "tamlyn" ], "license": "Apache-2.0", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2044", "repo": "Netflix/pollyjs", "url": "https://github.com/Netflix/pollyjs/issues/279" }
gharchive/issue
Strange behaviour matching request modified in beforePersist Description I think this is a bug but there's always a chance it's a feature and I haven't understood something. I'm testing an authentication flow and I don't want the real auth tokens to be committed to the repo. I've set up a beforePersist middleware to replace real-token with dummy-token in the POST bodies. When recording I make the requests with real-token. Then when running my tests against the recordings I make the requests with dummy-token. I would expect this to work because the real-token was changed to dummy-token when saving the HAR. But it doesn't: the request doesn't match. The really strange thing is that if I run the test against the recordings but using the original real-token that I used when making the recordings it passes, even though that token doesn't appear in the HAR file. How does Polly remember the original token even when I've removed it from the HAR? I've created a minimal test case here https://github.com/tamlyn/polly-test-case to illustrate the problem. Node.js v12.13.1 darwin 17.7.0 npm 6.11.3 yarn 1.19.2 @tamlyn even though you're storing the dummy-token in the HAR file, you're still making the request with the real-token. Polly calculates the request's id based on the request you made (not whats stored in the HAR), so you would need to tell Polly to ignore the token altogether. You can do so via matchRequestsBy. Ah! So the _id is a hash of the request? I thought it was random. Is that documented anywhere? Is the request object as stored in the HAR used for anything? So the _id is a hash of the request Correct Is that documented anywhere? https://netflix.github.io/pollyjs/#/configuration?id=matchrequestsby Is the request object as stored in the HAR used for anything? For completeness with the HAR spec (importing into a HAR tool to inspect for example). In the future, we may leverage it more.
2025-04-01T06:37:18.174497
2017-02-21T17:49:49
209222176
{ "authors": [ "GJL", "avoosh" ], "license": "apache-2.0", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2045", "repo": "Netflix/zuul", "url": "https://github.com/Netflix/zuul/issues/307" }
gharchive/issue
Configuring PoolingHttpClientConnectionManager with Time to Live? Hi all, I am using zuul to route requests to statically configured services according to the request path. The services behind zuul are addressed using DNS names. The DNS records can change rather frequently (e.g., daily). I have seen in SimpleHostRoutingFilter that zuul uses PoolingHttpClientConnectionManager from Apache HttpComponents without configuring the time to live for the connections in the pool (see https://github.com/Netflix/zuul/blob/939ada9dce57709cf6b250b77fabfa37e8d988bf/zuul-simple-webapp/src/main/groovy/filters/route/SimpleHostRoutingFilter.groovy#L97). Even if the DNS records change, the connection pool in zuul is keeping the connections to the old instances open. Depending on the load, it can take many hours until all the old connections are evicted from the connection pool. I could subclass SimpleHostRoutingFilter and override the method newConnectionManager() to return my own instance of PoolingHttpClientConnectionManager with a configured TTL. Is there any other way to solve my problem, and does it make sense to add this feature to zuul? Best, Gary @GJL Hi, I am facing the same behaviour, how did you end up? @avoosh I moved the issue to https://github.com/spring-cloud/spring-cloud-netflix/issues/1720
2025-04-01T06:37:18.203342
2022-01-23T20:47:18
1111981662
{ "authors": [ "InProgress18", "matthewfeickert" ], "license": "BSD-3-Clause", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2046", "repo": "Neubauer-Group/GNN_code", "url": "https://github.com/Neubauer-Group/GNN_code/pull/1" }
gharchive/pull-request
Add Multi-GPU Training Multi-GPU training was added using the HuggingFace Accelerate package. Installation shell script was also updated to work with new and updated packages. @markusatkinson this is ready for review.
2025-04-01T06:37:18.204255
2024-12-09T01:21:02
2725712148
{ "authors": [ "NeverSinkDev", "Xandaros" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2047", "repo": "NeverSinkDev/NeverSink-PoE2litefilter", "url": "https://github.com/NeverSinkDev/NeverSink-PoE2litefilter/pull/2" }
gharchive/pull-request
Add Linux path to README Added the path for the filters on Linux. Also changed the formatting a bit (code instead if italic) and replaced the forward slashes with back slashes on Windows, since that is the canonical path separator there. Thanks, added
2025-04-01T06:37:18.205901
2015-04-08T15:20:12
67153779
{ "authors": [ "BloodyRookie", "fyahfox" ], "license": "mit", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2048", "repo": "NewEconomyMovement/NemCommunityClient", "url": "https://github.com/NewEconomyMovement/NemCommunityClient/issues/390" }
gharchive/issue
Harvested blocks are added when switching accounts 0.6.26-BETA "When I switch between accounts with the "HARVESTED BLOCKS" tab selected the previous accounts harvested blocks gets added to the currently selected accounts harvested blocks." https://forum.ournem.com/technical-discussion/nem-beta-0-6-26-security-update/msg15902/#msg15902 Can anybody confirm the behavior with version 0.6.28?
2025-04-01T06:37:18.246757
2024-11-11T15:42:38
2649707556
{ "authors": [ "Neo23x0", "gibranalvinda", "simonstegard" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2049", "repo": "NextronSystems/velociraptor-artifacts-thor", "url": "https://github.com/NextronSystems/velociraptor-artifacts-thor/issues/7" }
gharchive/issue
ThorZIP: executable file not found in %PATH% I'm trying to run Generic.Scanner.ThorZIP but it's not working. I have uploaded the zip using ThorZIP tool, I tried both zip with included license and unmodified zip downloaded directly from website, but same problem. {"client_time":1731337531,"level":"INFO","message":"Starting query execution for Generic.Scanner.ThorZIP/ThorExec.\n"} {"client_time":1731337531,"level":"DEFAULT","message":"tempfile: removing tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp391399109\n"} {"client_time":1731337531,"level":"DEFAULT","message":"tempfile: removed tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp391399109\n"} {"client_time":1731337532,"level":"DEFAULT","message":"Sleeping 7 Seconds\n"} {"client_time":1731337539,"level":"DEFAULT","message":"URL for thor10.7lite-win-pack_nolic.zip is at https://xxx.azurewebsites.net/file/thor10.7lite-win-pack_nolic.zip and has hash of c1a306af9e9162d14d52374e188a8dc20005752e6c5b580e8316f2323ce7591c\n"} {"client_time":1731337539,"level":"DEFAULT","message":"Fetching https://xxx.azurewebsites.net/file/thor10.7lite-win-pack_nolic.zip\n"} {"client_time":1731337539,"level":"DEFAULT","message":"http_client: Downloading https://xxx.azurewebsites.net/file/thor10.7lite-win-pack_nolic.zip into C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp\n"} {"client_time":1731337542,"level":"DEFAULT","message":"downloaded hash of C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp: c1a306af9e9162d14d52374e188a8dc20005752e6c5b580e8316f2323ce7591c, expected c1a306af9e9162d14d52374e188a8dc20005752e6c5b580e8316f2323ce7591c\n"} {"client_time":1731337542,"level":"DEFAULT","message":"copy: Copying file from C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp into C:\\Program Files\\Velociraptor\\Tools\\thor10.7lite-win-pack_nolic.zip\n"} {"client_time":1731337543,"level":"DEFAULT","message":"tempfile: removing tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp\n"} {"client_time":1731337543,"level":"DEFAULT","message":"tempfile: removed tempfile C:\\Program Files\\Velociraptor\\Tools\\tmp1158147984.tmp\n"} {"client_time":1731337543,"level":"DEFAULT","message":"Adding global destructor for C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"} {"client_time":1731337543,"level":"WARN","message":"Materialize of LET Unzip: Expand larger than 1000 rows, VQL will switch to tempfile backing on C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754 which will be much slower.\n"} {"client_time":1731337544,"level":"DEFAULT","message":"execve: Running external command [[C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\\thor64-lite.exe --json -e C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095] []]\n"} {"client_time":1731337544,"level":"DEFAULT","message":"execve: exec: \"[C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095\\\\thor64-lite.exe --json -e C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095]\": executable file not found in %PATH%\n"} {"client_time":1731337544,"level":"DEFAULT","message":"Generic.Scanner.ThorZIP/ThorExec: Time 0: Generic.Scanner.ThorZIP/ThorExec: Sending response part 0 3 B (1 rows)."} {"client_time":1731337544,"level":"DEFAULT","message":"read_file: Field filename Expecting a path arg type, not types.Null\n"} {"client_time":1731337544,"level":"DEFAULT","message":"Generic.Scanner.ThorZIP/ThorExec: Time 0: Generic.Scanner.ThorZIP/ThorResultsJson: Sending response part 0 12 B (1 rows)."} {"client_time":1731337544,"level":"INFO","message":"Collection Generic.Scanner.ThorZIP/ThorExec is done after 13.4206963s\n"} {"client_time":1731337544,"level":"DEFAULT","message":"tempfile: removing tempfile C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754\n"} {"client_time":1731337544,"level":"DEFAULT","message":"tempfile: removed tempfile C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754\n"} {"client_time":1731337544,"level":"DEFAULT","message":"RemoveDirectory: removing tempdir C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"} {"client_time":1731337545,"level":"DEFAULT","message":"RemoveDirectory: removed tempdir C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"} {"client_time":1731337545,"level":"DEBUG","message":"Query Stats: {\"RowsScanned\":3061,\"PluginsCalled\":18,\"FunctionsCalled\":9,\"ProtocolSearch\":459,\"ScopeCopy\":6167}\n"} Could you send us a screenshot of the directory structure inside of that ZIP file? The binary is probably just inside of a sub folder instead of the root folder. The structure looks okay. As you can see the problem is that it doesn't find the executable after the extraction {"client_time":1731337543,"level":"DEFAULT","message":"Adding global destructor for C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\n"} {"client_time":1731337543,"level":"WARN","message":"Materialize of LET Unzip: Expand larger than 1000 rows, VQL will switch to tempfile backing on C:\\Program Files\\Velociraptor\\Tools\\VQL_Unzip_.jsonl1648725754 which will be much slower.\n"} {"client_time":1731337544,"level":"DEFAULT","message":"execve: Running external command [[C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095\\thor64-lite.exe --json -e C:\\Program Files\\Velociraptor\\Tools\\tmp3319932095] []]\n"} {"client_time":1731337544,"level":"DEFAULT","message":"execve: exec: \"[C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095\\\\thor64-lite.exe --json -e C:\\\\Program Files\\\\Velociraptor\\\\Tools\\\\tmp3319932095]\": executable file not found in %PATH%\n"} It could be caused by: AV / EDR almost full hard disk Could you verify the SHA256 hash of the ZIP file before you upload it to AWS? same issue, Le tme know when you've found the reason. I have fixed it by changing it to: LET Exec <= SELECT * FROM execve(argv=[(Executable[0]).F, "--json", "-e", TmpDir])
2025-04-01T06:37:18.315096
2024-08-11T17:26:59
2459686333
{ "authors": [ "NamecoinGithub", "NealHelman", "S4X1" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2050", "repo": "Nexusoft/LLL-TAO", "url": "https://github.com/Nexusoft/LLL-TAO/issues/170" }
gharchive/issue
Bootstrap No Longer Available to Download and Unable to Sync from Block 0 The bootstrap is no longer available to download and the protocol is unable to sync from Block 0 without getting stuck on the known block (known issue). @VidereLicet please fix this major issue. We no longer have a way to run a full node making the protocol extremely centralized. I started looking @ IP's @ the Break, and a Hong Kong Chi-Com IP pops out! <IP_ADDRESS> I blocked that IP and tried downloading the Blockchain again, and this time @ start of Sync it seemed to not throw type of Orphan before the other Hard Crash Block, but it usually always heals from restarting the Nexus Client! I think Hard-code a Geo Block for Hong Kong! Chi-Coms use it as a so called "Democratic" Digital Hub to spread as a Chi-Com Advance Guard! But it's simple to Geo Block all HK as it has it's own Country Code HK, but otherwise I would recommending maybe blocking this Block of IP's! Plus It would be a Revolutionary Act to proactively GEO Block the Chi-Coms who only spread Crime around the World and Drugs using Crypto, there has been nothing positive to ever come out of China in regards to Crypto development! ASIC's will be history as they aren't QUANTUM SECURE~! Binance is owned by Canadian Born Chi-Com who mastered how the Kosher Bankers Manipulate the System and Setup his Persona as the Hallmark of A+ No Fraud Backup Fund Repair Asian Guy Perfectly! There is no real Scenario where Nexus Geo Blocking the Chi-Coms could be a bad thing as they provide nothing but wasteful destruction using their Now Privileged Position in the World brought about by Corrupt Elements within the Earth mainly the Kiken Mossad and Vatican once the Jewish Mafias worked out all the Rat Runs for the Chi-Coms to be their Slave labor Engine, to depose the West Morally and Financially dumping the Western Populations in horror of their Porn Capitals Hundred Billion a year Profit Industry @ same time propping up Chi-Com slave labor and Position in the World! Mostly without a proper Judge upon Earth with enough Power as even now Israel and Russia have both International Arrest Warrants from the UN War Crimes Tribunal but are readily ignored by all the main Actors within each Geo Blocked Sphere the Kosher Bankers have created of the Earth as Sanctions are the Kosher Bankers #1 Tool for Control! <IP_ADDRESS> 47.75.0/255.0/255 On a more Technical Note with Nexus Development As far as I know Nexus Tritium can cut off the Blockchain from that fork in 2020! So the Blockchain would be much smaller and start downloading from 2020 or something similar like that! The main Strategy I think Colin is trying to Solve is using the Old Nexus Bitcoin Code base to Soon have Nexus be able to Import Bitcoin Wallet.dat Files into their Sigchains ect...........and use it as Collateral for NXS/BTC Exchange within the Tritium Nexus GUI But I think Monero is much better long term Strategy for many reasons, most of which I think it has a lot of Value Creation Compared to Bitcoin's 1.5 Trillion Market Cap Versus Monero 5 Billion Market Cap! As for this Blockchain Sync Business I am not too worried about it, I could setup my Computer to use Tor Firewall and get it to work, however I don't trust Tor, and Prefer Wireguard Firewall! I think it will get worked out anyway, the Next Release should be the Hard Fork Release, so it's just a matter of where to place the Hard Fork, but IDK in reality without a lot more discussion! Either way I think Nexus will as Colin said cut the Old Blockchain Bloat on the Old Code base! That is where this Issue is stemming from on Bitcoin Code Nexus Blocks from 2015, Not the New Tritium Code base just to Clarify! So it will get Resolved 1 way or another! Bootstrap is now consistently available.
2025-04-01T06:37:18.321414
2024-05-17T20:28:10
2303533120
{ "authors": [ "jc21", "julianq" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2051", "repo": "NginxProxyManager/nginx-proxy-manager", "url": "https://github.com/NginxProxyManager/nginx-proxy-manager/issues/3762" }
gharchive/issue
Very slow loading behind Cloudflare proxy Checklist Have you pulled and found the error with jc21/nginx-proxy-manager:latest docker image? Yes Are you sure you're not using someone else's docker image? Yes Have you searched for similar issues (both open and closed)? Yes Describe the bug Very slow loading times when behind Cloudflare proxy. Not going through Cloudflare proxy works fine. Issue showed up in 2.11.0, as rolling back to 2.10.4 resolves the problem. Nginx Proxy Manager Version 2.11.0, 2.11.1, 2.11.2 Additional context May be related to #3365? As stated on #3365 running this project behind a proxy isn't really its intended purpose. That said, just like any other website, there shouldn't be a problem. Are you proxying to NPM over HTTP or HTTPS?
2025-04-01T06:37:18.365522
2018-10-16T12:03:50
370578217
{ "authors": [ "NickeManarin", "longzheng", "riverar", "smaragdus", "vatterspun" ], "license": "MS-PL", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2052", "repo": "NickeManarin/ScreenToGif", "url": "https://github.com/NickeManarin/ScreenToGif/issues/389" }
gharchive/issue
Bundling FFmpeg I just tried ScreenToGif for the first time and was a bit surprised to see that exporting to MP4 wasn't natively supported. I realized that it supports FFmpeg output, but it requires it to be installed. I was wondering if there any limitation to bundle FFmpeg as part of ScreenToGif so users don't have to install it separately? (I guess retain the ability to override the FFmpeg install as an advanced option) Also noticed that you do have a button to download FFmpeg in the options, but it prompts the user to specify a download location. Could I suggest if the app is installed, then at least this button by default would save FFmpeg to the installation directory (so it's 1 step less for the user)? You might also want to do what ShareX has integrated with their software: an auto-download feature. That will maintain a small download size and enable video export for the users that need it. Alternatively, you might point to one of a number of available open FFMPEG font-ends for a video export tool that works with the amazing number of features built into that tool. Some possibilities: FFmpegCatapult: https://github.com/mylesthaiss/FFmpegCatapult SmartFFmpeg: http://freeware.satria.de/SmartFFmpeg/index.php?lang=EN WinFF: www.biggmatt.com/winff/ Related thread: #376 Worrying about the size of the program is completely wrong headed. Also, ffmpeg encodes to a mind-boggling number of formats, in various containers, so the "MP4" complaint is wrong. I searched my machine and it turned out that there are 71 instances of ffmpeg.exe used by various programs- players, converters, video, audio and tag editors, downloaders, catalogs, servers, etc. Most of these programs come with absolute, hard-coded paths to ffmpeg.exe and as a result I have not just multiple instances but also different (in most cases- outdated) versions of ffmpeg.exe. Besides a huge waste of space it is also a huge waste of time to update these instances one by one. #563
2025-04-01T06:37:18.377115
2019-04-14T15:11:31
432989918
{ "authors": [ "NicolasGuilloux", "dylanmtaylor" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2054", "repo": "NicolasGuilloux/blade-shadow-beta", "url": "https://github.com/NicolasGuilloux/blade-shadow-beta/issues/31" }
gharchive/issue
Arch version fails to build (includes proposed fix) As of the new version, I'm having issues installing this on Arch linux via the AUR. I did some digging and discovered that the md5sum changed and the location and name of the .desktop file have also been modified. I was able to get it to build with a few modifications: The md5sum of the file actually downloaded was d47e22482755a2fc73061860c09d41ac - this might need updated in the source code. If you put this value into PKGBUILD after cloning the repo and run makepkg, it works: source=('https://shadow.tech/linux/shadow-beta.zip') md5sums=('d47e22482755a2fc73061860c09d41ac') The .desktop file, it is actually named shadow-dev.desktop in the new archive so the PKGBUILD script should be updated to reflect this: ### Edit launcher sed -e 's/^Categories=.*$/Categories=Games;Game;Utility;Virtualization/g' "${pkgdir}/usr/share/applications/shadow-dev.desktop" > shadow-beta.desktop chmod g-w shadow-beta.desktop rm "${pkgdir}/usr/share/applications/shadow-dev.desktop" mv shadow-beta.desktop "${pkgdir}/usr/share/applications/shadow-beta.desktop" Please update this so that others can benefit :) AUR package updated, thanks to you :)
2025-04-01T06:37:18.381856
2016-04-14T18:12:10
148440725
{ "authors": [ "LMLB", "NielsLeenheer" ], "license": "mit", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2055", "repo": "NielsLeenheer/html5test", "url": "https://github.com/NielsLeenheer/html5test/issues/432" }
gharchive/issue
The "Access the webcam" test is outdated navigator.getUserMedia is deprecated and was replaced by navigator.mediaDevices.getUserMedia Fixed
2025-04-01T06:37:18.413889
2019-03-22T13:04:36
424199580
{ "authors": [ "NightCatSama", "Sergey-Ssn" ], "license": "mit", "license_source": "bigquery", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2056", "repo": "NightCatSama/vue-slider-component", "url": "https://github.com/NightCatSama/vue-slider-component/issues/326" }
gharchive/issue
How to disable styles? Hi, I want to disable CSS styles plugin, I do not see a way to do it? What is CSS styles plugin? What is CSS styles plugin? vue-slider-component , can I disable styles? What do you want to do, whether it is a style with the slider disabled or not using the default style of the slider? not using the default style of the slider https://yadi.sk/i/p0XVuOLLauGBAg I use my own styles and I don't need to load slider styles doing the double work of overriding css Version 2.0 is not easy to rewrite styles, you can upgrade to version 3.0. You can refer https://nightcatsama.github.io/vue-slider-component/#/style Version 2.0 is not easy to rewrite styles, you can upgrade to version 3.0. You can refer https://nightcatsama.github.io/vue-slider-component/#/style Yes version 3 solved my problem, thanks
2025-04-01T06:37:18.431448
2024-11-05T22:35:25
2636608888
{ "authors": [ "Nikoloutsos", "douglasgondim", "kostasniks" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2057", "repo": "Nikoloutsos/explicitDependencyImportCheck", "url": "https://github.com/Nikoloutsos/explicitDependencyImportCheck/issues/2" }
gharchive/issue
[Feature] – Return transitive dependencies list in alphabetical order It would be nice if we had this feature to have consistency in the results. Yes, we can sort the transitive dependencies alphabetically for same error reporting each time 👍 I am more than welcome if you want to contribute to this repo by creating a PR Yes, we can sort the transitive dependencies alphabetically for same error reporting each time 👍 I am more than welcome @douglasgondim if you want to contribute to this repo by creating a PR
2025-04-01T06:37:18.434296
2024-04-17T16:08:50
2248679826
{ "authors": [ "KlonD90", "ukorvl" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2058", "repo": "NilFoundation/ui-kit", "url": "https://github.com/NilFoundation/ui-kit/pull/278" }
gharchive/pull-request
Replace PRIMITIVE_COLORS with COLORS Replacement of PRIMITIVE_COLORS variable with COLORS to make it shorter and more convenient to use. Name primitive colors makes no since we have no "non-primitive" colors. It's breaking changes It should have 3.0 version because it's breaking changes or you should provide backward compatibility Agree, thanks.
2025-04-01T06:37:18.503730
2015-10-05T16:12:45
109833121
{ "authors": [ "Lassulus", "peti" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2059", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/10240" }
gharchive/issue
can't build rss2irc from haskellPackages nix-env -iA nixos.haskellPackages.rss2irc output: Preprocessing executable 'rss2irc' for rss2irc-1.0.6... Feed.hs:24:8: Could not find module ‘Network.URI’ It is a member of the hidden package ‘network-uri-<IP_ADDRESS>@netwo_8g2FaihlDOW7yH7DhmRvHt’. Perhaps you need to add ‘network-uri’ to the build-depends in your .cabal file. Use -v to see a list of the files searched for. builder for ‘/nix/store/mw7ai3bngizdcasgajqsdmi22nmyk49s-rss2irc-1.0.6.drv’ failed with exit code 1 It's probably best to report this issue upstream. The package is quite outdated (http://packdeps.haskellers.com/feed?needle=rss2irc) and needs some attention before recent compilers can build it.
2025-04-01T06:37:18.514244
2021-03-03T16:29:09
821271552
{ "authors": [ "jtojnar", "symphorien", "veprbl", "xunam" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2060", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/114995" }
gharchive/issue
gimp plugin wavelet-sharpen replaces gimp on upgrade Describe the bug Using the current unstable channel, if install gimp in my user environment and then do an upgrade, Nix replaces gimp with the wavelet-sharpen plugin and effectively uninstalls gimp itself from the user environment. This does not happen in the stable branch 20.09. To Reproduce Here is a transcript of what happens: $ which gimp which: no gimp in (/run/wrappers/bin:/home/manu/.nix-profile/bin:/etc/profiles/per-user/manu/bin:/nix/var/nix/profiles/default/bin:/run/current-system/sw/bin) $ nix-env -iA nixpkgs.gimp installing 'gimp-2.10.22' $ which gimp /home/manu/.nix-profile/bin/gimp $ nix-env -q | grep gimp gimp-2.10.22 $ nix-env --upgrade upgrading 'gimp-2.10.22' to 'gimp-2.10.22-plugin-wavelet-sharpen-0.1.2' $ which gimp which: no gimp in (/run/wrappers/bin:/home/manu/.nix-profile/bin:/etc/profiles/per-user/manu/bin:/nix/var/nix/profiles/default/bin:/run/current-system/sw/bin) $ nix-env -q | grep gimp gimp-2.10.22-plugin-wavelet-sharpen-0.1.2 $ nix-env --uninstall gimp uninstalling 'gimp-2.10.22-plugin-wavelet-sharpen-0.1.2' Expected behavior I expect gimp to be upgraded. Apparently, the fact that that gimp-2.10.22-plugin-wavelet-sharpen-0.1.2 contains numbers in the middle is the source of the problem, as if 2.10.22-plugin-wavelet-sharpen-0.1.2 was a version number, and higher than 2.10.22. Notify maintainers The gimp package is maintained by @jtojnar, I don't know about the wavelet-sharpen plugin. Metadata system: "x86_64-linux" host os: Linux 5.4.99, NixOS, 20.09.3246.d4189f68fdb (Nightingale) multi-user?: yes sandbox: yes version: nix-env (Nix) 2.3.10 channels(manu): "nixpkgs-21.05pre273332.5df05c902cd" channels(root): "nixos-20.09.3343.8d82c865b41" nixpkgs: /home/manu/.nix-defexpr/channels/nixpkgs Maintainer information: # a list of nixpkgs attributes affected by the problem attribute: gimp # a list of nixos modules affected by the problem module: Ugh, I can’t wait for nix-env to be abandoned. This is a regression caused by https://github.com/NixOS/nixpkgs/commit/ef5475235ce4f3d1405dca5653cbe3599f0ff637 cc @erictapen On NixOS you probably shouldn't use nix-env at all (use configuration.nix or home-manager instead) and documentation should not encourage to use it imo: https://github.com/NixOS/nixos-homepage/issues/672 I'm all for using the declarative approach to handle user packages, and actually my current setup consists mostly in defining an environment with buildEnv in ~/.config/nixpkgs/config.nix with the packages I want. However I find the stateful system of nix-env to be a useful middle-ground between full declarative and using nix-shell for short-term usage of specific packages. As a side note, Gimp ended up installed through nix-env instead of config*.nix because of space constraints. On a system with a few gigabytes of storage allocated for /nix/store, upgrading a whole system with several big packages (e.g. Gimp, TeXlive, Haskell and other things) becomes a problem because you must have two versions of each present at the same time before you can switch to the new generation and garbage-collect the old one. At least, with nix-env, you can uninstall those, collect garbage, upgrade and then install them back without having to hack on your declarative configuration. As for Home Manager, I admit I am reluctant to make the switch from my years-old tuned and portable home configuration as long as the first words of its documentation are a big warning on the fact that it may break things. Ugh, I can’t wait for nix-env to be abandoned. To be fair, we would need to also get rid of this behaviour: nix-repl> builtins.parseDrvName "gimp-2.10.22-plugin-wavelet-sharpen-0.1.2" { name = "gimp"; version = "2.10.22-plugin-wavelet-sharpen-0.1.2"; } Yes, I would kill parseDrvName too, if I could.
2025-04-01T06:37:18.519851
2021-09-07T08:53:31
989750919
{ "authors": [ "Kreyren", "bjornfor", "legendofmiracles", "roberth" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2061", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/136972" }
gharchive/issue
Q: How can i write an output of a command to file using nixlang? I want to create a file with the content from stdout of command openssl rand -hex 64 to be provided to services.discourse.secretKeyBaseFile How can i do that in a reproducible way assuming that the current way is do a build with services.discourse.secretKeyBaseFile = "/run/keys/secret_key_base" and after build do manually openssl rand -hex 64 > /run/keys/secret_key_base && chown discourse:discourse /run/keys/secret_key_base && chmod 440 /run/keys/secret_key_base ? If you use nixlang I think the secret will end up in the nix store (not so secret). I would write a systemd service for your openssl commands that creates the /run/keys/secret_key_base file at runtime, and makes the discourse service wait for that file. @bjornfor I rather want to handle it through nixlang where the theory is: services.discourse.secretKeyBaseFile = pkgs.writeFile "/run/keys/secret_key_base" '' ${generateTheString} ''; Where i don't know how could i do the ${generateTheString} Probably something like reading /dev/random ? [kreyren@leonid:~]$ head -n1 /dev/random :#0��Ǟ0�PXn�����t�����gn�p(o�V�+�>g�<̻�Jсo�ԟ�ڀ4 {�I��_f���<�{ runCommand and friends can write data to the nix store, from a shell script. See here: https://nixos.org/manual/nixpkgs/stable/#trivial-builder-runCommand @legendofmiracles I want that outside of nix store, because it's a secret.. Which i assume is not possible? You could use nix-instantiate --eval --strict to get Nix values without necessarily writing them to the store. It's what NixOps uses for its keys (secrets) feature. It even has a resources to generate an ssh key and store it in the NixOps state, or do the same for an arbitrary command on the deployer's machine. Sadly, we don't have generated docs for NixOps 2 at the moment, but you can find the option descriptions for these resources here: https://github.com/NixOS/nixops/tree/master/nix
2025-04-01T06:37:18.526590
2022-03-29T11:12:26
1184699524
{ "authors": [ "I-Want-ToBelieve", "cafkafk", "koppor", "pbsds" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2062", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/166228" }
gharchive/issue
Packaging request: normcap Project description OCR-powered screenshot tool to capture text instead of images. Metadata homepage URL: https://dynobo.github.io/normcap/ source URL: https://github.com/dynobo/normcap license: GPL3 platforms: unix example package: AUR (PKGBUILD) I started working on this but I'm stuck at how to package with qt This seems to be a poetry-based project, meaning you should set format="pyproject" and add poetry-core as a nativeBuildInput. If adding the python qt libraries is not sufficient, then try using the hooks for Qt applications. https://github.com/nix-community/nur-combined/blob/6bddae47680482383b5769dd3aa7d82b88e6cbc8/repos/renesat/pkgs/normcap/default.nix#L42 I'll try to make a PR with this, ty Is it possible that normcap causes issues in recent NixOS? error: builder for '/nix/store/zk4imnx8zyibcghr5lriq31rwsyzcpvn-normcap-0.5.4.drv' failed with exit code 1; last 10 log lines: > =========================== short test summary info ============================ > FAILED tests/test_app.py::test_get_application - RuntimeError: Please destroy the QApplication singleton before creating a n... > FAILED tests/tests_gui/test_loading_indicator.py::test_radius - AttributeError: 'LoadingIndicator' object has no attribute 'timer' > FAILED tests/tests_gui/test_loading_indicator.py::test_opacities - AttributeError: 'LoadingIndicator' object has no attribute 'timer' > FAILED tests/tests_gui/test_loading_indicator.py::test_show_starts_timer - AttributeError: 'LoadingIndicator' object has no attribute 'timer' > FAILED tests/tests_gui/test_loading_indicator.py::test_hide_stops_timer - AttributeError: 'LoadingIndicator' object has no attribute 'timer' > FAILED tests/tests_gui/test_loading_indicator.py::test_frame_count_progresses - AttributeError: 'LoadingIndicator' object has no attribute 'timer' > FAILED tests/tests_gui/test_loading_indicator.py::test_circles_are_rendered - AttributeError: 'LoadingIndicator' object has no attribute 'timer' > ==== 7 failed, 297 passed, 15 skipped, 21 deselected, 13 warnings in 5.69s ===== > /nix/store/9wnvhjyxjykwn5y06xc9a2h8rs5fbfia-stdenv-linux/setup: line 1579: pop_var_context: head of shell_variables not a function context For full logs, run 'nix log /nix/store/zk4imnx8zyibcghr5lriq31rwsyzcpvn-normcap-0.5.4.drv'. error: 1 dependencies of derivation '/nix/store/2pvf5yvj6qi68k6hzlp6s3pjab7m09m5-home-manager-path.drv' failed to build error: 1 dependencies of derivation '/nix/store/mja27h5nbrcn4m82rb2mc972sxr625bp-home-manager-generation.drv' failed to build error: 1 dependencies of derivation '/nix/store/2wxil3bbrlk02vkg8qvwgr56q7i936q7-user-environment.drv' failed to build error: 1 dependencies of derivation '/nix/store/wib7xmij8pai67c6mvdvcplzqkl797n5-etc.drv' failed to build error: 1 dependencies of derivation '/nix/store/lbcml8mj88hiv0s2glv86ks2gm5lbr29-nixos-system-nixos-24.05.20240421.6143fc5.drv' failed to build > nix-shell -p nix-info --run "nix-info -m" - system: `"x86_64-linux"` - host os: `Linux 6.6.21, NixOS, 24.05 (Uakari), 24.05.20240312.0ad13a6` - multi-user?: `yes` - sandbox: `yes` - version: `nix-env (Nix) 2.18.1` - channels(root): `"nixos-23.11, unstable"` - nixpkgs: `/nix/store/k5l01g2zwhysjyl5zjvg5zxnj0lyxpp1-source` Fixed by https://github.com/NixOS/nixpkgs/pull/305822 which reaches unstable in a few fays
2025-04-01T06:37:18.535045
2022-10-31T14:33:00
1429948521
{ "authors": [ "Atemu", "gador", "hvraven" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2063", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/198787" }
gharchive/issue
paperless-ngx pdf import not working Describe the bug Using unstable paperless-ngx-1.9.2 (on a 22.05 system) I am no longer able to import documents from the web interface as they fail with a MissingDependencyError in unpaper. Sadly parts of the error log appear to be missing, I am not sure how to get the full output. Steps To Reproduce Steps to reproduce the behavior: Configure service.paperless with package = pkgs.unstable.paperless-ngx Import document from the web interface Expected behavior Document should be processed and show up in the document list Log Oct 31 15:24:42 nixos paperless-ngx[38670]: [2022-10-31 14:24:42,168] [ERROR] [paperless.consumer] Error while consuming document censored-document-name.pdf: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error: Oct 31 15:24:42 nixos paperless-ngx[38670]: Traceback (most recent call last): Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 157, in get_version Oct 31 15:24:42 nixos paperless-ngx[38670]: proc = run( Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 58, in run Oct 31 15:24:42 nixos paperless-ngx[38670]: proc = subprocess_run(args, env=env, check=check, **kwargs) Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/fkcl1wzq3106qqgl84bhgk1lp56q6bzg-python3-3.10.7/lib/python3.10/subprocess.py", line 524, in run Oct 31 15:24:42 nixos paperless-ngx[38670]: raise CalledProcessError(retcode, process.args, Oct 31 15:24:42 nixos paperless-ngx[38670]: subprocess.CalledProcessError: Command '['/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper', '--version']' died with <Signals.SIGSYS: 31>. Oct 31 15:24:42 nixos paperless-ngx[38670]: The above exception was the direct cause of the following exception: Oct 31 15:24:42 nixos paperless-ngx[38670]: Traceback (most recent call last): Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 277, in parse Oct 31 15:24:42 nixos paperless-ngx[38670]: ocrmypdf.ocr(**args) Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/api.py", line 339, in ocr Oct 31 15:24:42 nixos paperless-ngx[38670]: check_options(options, plugin_manager) Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 245, in check_options Oct 31 15:24:42 nixos paperless-ngx[38670]: _check_plugin_invariant_options(options) Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 232, in _check_plugin_invariant_options Oct 31 15:24:42 nixos paperless-ngx[38670]: check_options_preprocessing(options) Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 132, in check_options_preprocessing Oct 31 15:24:42 nixos paperless-ngx[38670]: check_external_program( Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 331, in check_external_program Oct 31 15:24:42 nixos paperless-ngx[38670]: found_version = version_checker() Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_exec/unpaper.py", line 69, in version Oct 31 15:24:42 nixos paperless-ngx[38670]: return get_version('/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper') Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 173, in get_version Oct 31 15:24:42 nixos paperless-ngx[38670]: raise MissingDependencyError( Oct 31 15:24:42 nixos paperless-ngx[38670]: ocrmypdf.exceptions.MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error: Oct 31 15:24:42 nixos paperless-ngx[38670]: The above exception was the direct cause of the following exception: Oct 31 15:24:42 nixos paperless-ngx[38670]: Traceback (most recent call last): Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 320, in try_consume_file Oct 31 15:24:42 nixos paperless-ngx[38670]: document_parser.parse(self.path, mime_type, self.filename) Oct 31 15:24:42 nixos paperless-ngx[38670]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 333, in parse Oct 31 15:24:42 nixos paperless-ngx[38670]: raise ParseError(f"{e.__class__.__name__}: {str(e)}") from e Oct 31 15:24:42 nixos paperless-ngx[38670]: documents.parsers.ParseError: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error: Oct 31 15:24:42 nixos paperless-ngx[38670]: 14:24:42 [Q] INFO Process-1:4 stopped doing work Oct 31 15:24:42 nixos paperless-ngx[38596]: 14:24:42 [Q] ERROR Failed [censored-document-name.pdf] - censored-document-name.pdf: Error while consuming document censored-document-name.pdf: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error: Oct 31 15:24:42 nixos paperless-ngx[38596]: : Traceback (most recent call last): Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 157, in get_version Oct 31 15:24:42 nixos paperless-ngx[38596]: proc = run( Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 58, in run Oct 31 15:24:42 nixos paperless-ngx[38596]: proc = subprocess_run(args, env=env, check=check, **kwargs) Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/fkcl1wzq3106qqgl84bhgk1lp56q6bzg-python3-3.10.7/lib/python3.10/subprocess.py", line 524, in run Oct 31 15:24:42 nixos paperless-ngx[38596]: raise CalledProcessError(retcode, process.args, Oct 31 15:24:42 nixos paperless-ngx[38596]: subprocess.CalledProcessError: Command '['/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper', '--version']' died with <Signals.SIGSYS: 31>. Oct 31 15:24:42 nixos paperless-ngx[38596]: The above exception was the direct cause of the following exception: Oct 31 15:24:42 nixos paperless-ngx[38596]: Traceback (most recent call last): Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 277, in parse Oct 31 15:24:42 nixos paperless-ngx[38596]: ocrmypdf.ocr(**args) Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/api.py", line 339, in ocr Oct 31 15:24:42 nixos paperless-ngx[38596]: check_options(options, plugin_manager) Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 245, in check_options Oct 31 15:24:42 nixos paperless-ngx[38596]: _check_plugin_invariant_options(options) Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 232, in _check_plugin_invariant_options Oct 31 15:24:42 nixos paperless-ngx[38596]: check_options_preprocessing(options) Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_validation.py", line 132, in check_options_preprocessing Oct 31 15:24:42 nixos paperless-ngx[38596]: check_external_program( Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 331, in check_external_program Oct 31 15:24:42 nixos paperless-ngx[38596]: found_version = version_checker() Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/_exec/unpaper.py", line 69, in version Oct 31 15:24:42 nixos paperless-ngx[38596]: return get_version('/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper') Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/dk6m8qsyichiyh4b3v5d5b7kqjjnswgd-python3.10-ocrmypdf-13.7.0/lib/python3.10/site-packages/ocrmypdf/subprocess/__init__.py", line 173, in get_version Oct 31 15:24:42 nixos paperless-ngx[38596]: raise MissingDependencyError( Oct 31 15:24:42 nixos paperless-ngx[38596]: ocrmypdf.exceptions.MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error: Oct 31 15:24:42 nixos paperless-ngx[38596]: The above exception was the direct cause of the following exception: Oct 31 15:24:42 nixos paperless-ngx[38596]: Traceback (most recent call last): Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/28535xrr4xv02r0xlq6b5k9gqy96d9cq-python3.10-asgiref-3.5.2/lib/python3.10/site-packages/asgiref/sync.py", line 280, in main_wrap Oct 31 15:24:42 nixos paperless-ngx[38596]: raise exc_info[1] Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 320, in try_consume_file Oct 31 15:24:42 nixos paperless-ngx[38596]: document_parser.parse(self.path, mime_type, self.filename) Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/paperless_tesseract/parsers.py", line 333, in parse Oct 31 15:24:42 nixos paperless-ngx[38596]: raise ParseError(f"{e.__class__.__name__}: {str(e)}") from e Oct 31 15:24:42 nixos paperless-ngx[38596]: documents.parsers.ParseError: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error: Oct 31 15:24:42 nixos paperless-ngx[38596]: The above exception was the direct cause of the following exception: Oct 31 15:24:42 nixos paperless-ngx[38596]: Traceback (most recent call last): Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/0lg74rgck6skkf4p14ivqsk1nb60d5ck-python3.10-django-q-1.3.9/lib/python3.10/site-packages/django_q/cluster.py", line 454, in worker Oct 31 15:24:42 nixos paperless-ngx[38596]: res = f(*task["args"], **task["kwargs"]) Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/tasks.py", line 154, in consume_file Oct 31 15:24:42 nixos paperless-ngx[38596]: document = Consumer().try_consume_file( Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 339, in try_consume_file Oct 31 15:24:42 nixos paperless-ngx[38596]: self._fail( Oct 31 15:24:42 nixos paperless-ngx[38596]: File "/nix/store/za5yxgmxgmf8rdlhni9xg3w7mcwnf9bm-paperless-ngx-1.9.2/lib/paperless-ngx/src/documents/consumer.py", line 90, in _fail Oct 31 15:24:42 nixos paperless-ngx[38596]: raise ConsumerError(f"{self.filename}: {log_message or message}") from exception Oct 31 15:24:42 nixos paperless-ngx[38596]: documents.consumer.ConsumerError: censored-document-name.pdf: Error while consuming document censored-document-name.pdf: MissingDependencyError: Ran program '/nix/store/s9qywrdw15ihkxw5fwjya47551fs58vh-unpaper-7.0.0/bin/unpaper' but it exited with an error: Oct 31 15:24:43 nixos paperless-ngx[38594]: 14:24:43 [Q] INFO recycled worker Process-1:4 Oct 31 15:24:43 nixos paperless-ngx[38685]: 14:24:43 [Q] INFO Process-1:5 ready for work at 38685 Notify maintainers @lukegb, @gador, @erikarvstedt Metadata [user@system:~]$ nix-shell -p nix-info --run "nix-info -m" - system: `"x86_64-linux"` - host os: `Linux 5.15.74, NixOS, 22.05 (Quokka), 22.05.3900.26eb67abc9a` - multi-user?: `yes` - sandbox: `yes` - version: `nix-env (Nix) 2.8.1` - channels(hendrik): `""` - channels(root): `"nixos-22.05, nixos-hardware, nixpkgs-unstable"` - nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos` I just tested it on the current master as well as nixos-unstable. Both work just fine. I suspect it has something to do with you runnung 22.05 and using a package from the unstable branch. I've seen weird errors when mixing those (e.g. with pgadmin here). @hvraven is this still an issue? Swapping out the executable with one from a different release is not supported.
2025-04-01T06:37:18.541937
2016-12-10T09:31:04
194755925
{ "authors": [ "joachifm", "tohl", "unlmtd" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2064", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/21038" }
gharchive/issue
Cjdns can't create keys in /etc Issue description With cjdns enabled, the service complains that it can't create the necessary keys in /etc /nix/store/9ms47qxfd0qrxn4s689m9pbdrds57d59-unit-script/bin/cjdns-pre-start: line 9: /etc/cjdns.keys: Read-only file system Steps to reproduce services.cjdns.enable = true; Technical details System: 17.03pre96925.1c50bdd (Gorilla) Nix version: 1.11.4 Nixpkgs version: 17.03pre96925.1c50bdd This seems to be the relevant part in nixpkgs/nixos/modules/services/networking/cjdns.nix preStart = if cfg.confFile != null then "" else '' [ -e /etc/cjdns.keys ] && source /etc/cjdns.keys if [ -z "$CJDNS_PRIVATE_KEY" ]; then shopt -s lastpipe ${pkg}/bin/makekeys | { read private ipv6 public; } umask 0077 echo "CJDNS_PRIVATE_KEY=$private" >> /etc/cjdns.keys echo -e "CJDNS_IPV6=$ipv6\nCJDNS_PUBLIC_KEY=$public" > /etc/cjdns.public chmod 600 /etc/cjdns.keys chmod 444 /etc/cjdns.public fi if [ -z "$CJDNS_ADMIN_PASSWORD" ]; then echo "CJDNS_ADMIN_PASSWORD=$(tr -dc A-Za-z0-9 </dev/urandom | head -c 96)" \ >> /etc/cjdns.keys fi ''; What would be the Nixos way here? Yes, it's because the "hardening" is too zealous, it needs to let preStart run as root (or not run with ProtectSystem = full or whatever) @unlmtd can you try something like services.cjdns.serviceConfig.PermissionsStartOnly = true? nixos-rebuild says that option doesnt exist Agh, sorry, that should be systemd.services.cjdns.serviceConfig That didn't do it, Im getting the same error. Hm, I guess it doesn't pertain to fs isolation options; then you need to change ProtectSystem = "full" to true (or false). ProtectSystem = "full" prevents writing the keys (/etc is read-only). pre-start should be refactored to a separate systemd service without that restriction, and cjdns run with that restriction in another service. This should be fixed by a0338afe5faa9f9e403e2caa52e4a8b60c272be9. A better fix is at https://github.com/joachifm/nixpkgs/tree/cjdns-init-keys but is not very well tested.
2025-04-01T06:37:18.547634
2017-05-24T09:50:15
230982325
{ "authors": [ "andyjscott", "edolstra", "romildo" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2065", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/26052" }
gharchive/issue
With mlocate normal users cannot access /var/cache Issue description After switching from the default locate package to mlocate, normal users cannot access /var/cache anymore: $ locate vertical-dark-opaque.tint2rc locate: can not open `/var/cache/locatedb': Permission denied $ ls -l /var | grep cache drwxr-x--- 4 root mlocate 4096 May 21 12:01 cache My configuration.nix has the following: services.locate = { enable = true; prunePaths = [ "/tmp" "/var/cache" "/var/lock" "/var/run" "/var/spool" ]; interval = "hourly"; locate = pkgs.mlocate; }; Technical details System: 17.09pre107265.0afb6d789c (Hummingbird) Nix version: nix-env (Nix) 1.11.9 Nixpkgs version: "17.09pre107265.0afb6d789c" Sandboxing enabled: build-use-sandbox = false cc @pngwjpgh @andyjscott More information: # systemctl status update-locatedb ● update-locatedb.service - Update Locate Database Loaded: loaded (/nix/store/hvppx691rlm50drqmy3bbxgbihqacd20-unit-update-locatedb.service/update-locatedb.service; linked; vendor preset: enabled) Active: failed (Result: exit-code) since Wed 2017-05-24 06:00:01 BRT; 57min ago Process: 13268 ExecStart=/nix/store/mhwn1prj1vbn9lqqq2rxin2b8761y569-unit-script/bin/update-locatedb-start (code=exited, status=1/FAILURE) Main PID: 13268 (code=exited, status=1/FAILURE) May 24 06:00:00 jrm.no-ip.org systemd[1]: Started Update Locate Database. May 24 06:00:01 jrm.no-ip.org update-locatedb-start[13268]: /nix/store/j96vg63fm5v7kxfg308q99jasx40f05h-mlocate-0.26/bin/updatedb: unrecognized option '--localuser=nobody' May 24 06:00:01 jrm.no-ip.org systemd[1]: update-locatedb.service: Main process exited, code=exited, status=1/FAILURE May 24 06:00:01 jrm.no-ip.org systemd[1]: update-locatedb.service: Unit entered failed state. May 24 06:00:01 jrm.no-ip.org systemd[1]: update-locatedb.service: Failed with result 'exit-code'. This is caused by install -m ${if isMLocate then "0750" else "0755"} -o root -g ${if isMLocate then "mlocate" else "root"} -d $(dirname ${cfg.output}) This line should be replaced by mkdir -m 0755 -p /var/cache and the cfg.output option should be removed since there is really no reason to make that path configurable. It looks like localuser = null; should also be set for mlocate due to the failure message: ... mlocate-0.26/bin/updatedb: unrecognized option '--localuser=nobody' Currently a warning is shown but it should probably be an error as it breaks the update service.
2025-04-01T06:37:18.550769
2024-04-28T22:43:06
2267857644
{ "authors": [ "eclairevoyant", "mwalid207" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2066", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/307574" }
gharchive/issue
Package request: ondsel Project description Metadata homepage URL: https://ondsel.com/ source URL: license: mit, bsd, gpl2+ , ... platforms: unix, linux, darwin, ... Add a :+1: reaction to issues you find important. duplicate of #284524
2025-04-01T06:37:18.556882
2017-11-04T21:42:52
271228694
{ "authors": [ "5paceToast", "IvanMalison", "brainrape", "joncojonathan" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2067", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/31261" }
gharchive/issue
Keybase GUI shouldn't check hardcoded /keybase mountpoint Issue description The keybase-gui wrapper checks for a hardcoded value to see if kbfs is mounted there. However, this is configurable through the kbfs service, and defaults to ~/keybase. The wrapper should either be hard-coded to whatever options.services.kbfs.mountPoint is, or verify the status some other way (e.g calling keybase status). Steps to reproduce Set the following in configuration.nixservices.keybase.enable = true; services.kbfs.enable = true; nix-env -iA nixos.keybase-gui rebuild your configuration try to launch keybase-gui Expected behavior Tests pass and keybase-gui launches. Actual behavior Keybase is not mounted to /keybase. You might need to run: kbfsfuse /keybase Set NIX_SKIP_KEYBASE_CHECKS=1 if you want to skip this check. Technical details System: 18.03pre119292.cfafd6f5a8 (Impala) Nix version: 1.11.15 Nixpkgs version: 18.03pre119292.cfafd6f5a8 Sandboxing enabled: false ^ added hardcoded ~/keybase Hi @brainrape , While this does look like it'll work in most scenarios it doesn't solve the overall problem in #31261 as it's now just looking at two options of hardcoded mountpoint. A better solution would be to have the wrapper (I may have used the wrong word, if so, sorry) check for where keybase is mounted and then use that. Are we not able to do that instead? Updated PR with suggested fix. @brainrape status? Waiting for merge. @ mentioned maintainer.
2025-04-01T06:37:18.561726
2024-06-08T19:10:49
2341790926
{ "authors": [ "Henry-Hiles", "RossComputerGuy" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2068", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/318344" }
gharchive/issue
Update request: flutter 3.22.0 → 3.22.2 Package name: flutter Latest released version: 3.22.2 Current version on the unstable channel: 3.22.0 Current version on the stable/release channel: 3.22.0 [x] Checked the nixpkgs pull requests Notify maintainers @NixOS/flutter Note for maintainers: Please tag this issue in your PR. Add a :+1: reaction to issues you find important. I can get this later today I can get this later today Thank you! @Henry-Hiles #318396 I'll test that tomorrow thanks!
2025-04-01T06:37:18.584236
2018-02-23T18:56:06
299814629
{ "authors": [ "7c6f434c", "LnL7", "MP2E", "Mic92", "dtzWill", "fpletz", "orivej", "sjau" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2069", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/issues/35415" }
gharchive/issue
tmux "crashes???" when konsole tab is closed Issue description I've been using Konsole for years and it works great with tmux. However since a few days ago on unstable small, when I close a Konsole tab, the tmux session "in that tab" gets killed/stopped or whatever.... Steps to reproduce Use nixos-uunstable-small Open Konsole SSH into server Start TMUX session Right-click the konsole server tab and close it Open new tap, ssh into same server again Try to attach tmux --> https://youtu.be/-hXLPQfoI70 This has been happening not longer than 2 weeks I think... maybe even less than 1 week - not sure how long but not very long. Technical details Please run nix-shell -p nix-info --run "nix-info -m" and paste the results. system: "x86_64-linux" host os: Linux 4.14.21, NixOS, 18.03pre129183.a3c96fd4de3 (Impala) multi-user?: yes sandbox: no version: nix-env (Nix) 1.11.16 channels(hyper): "" channels(root): "nixos-18.03pre129183.a3c96fd4de3" nixpkgs: /nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs Ok, I tested this on another server - same behaviour: system: "x86_64-linux" host os: Linux 4.9.81, NixOS, 18.03pre128357.327a84749ed (Impala) multi-user?: yes sandbox: no version: nix-env (Nix) 1.11.16 channels(root): "nixos-18.03pre128357.327a84749ed" nixpkgs: /nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs If I do this on a non-nixos server it all works fine. I tested on a third server - this time I get the expected behaviour: system: "x86_64-linux" host os: Linux 4.9.75, NixOS, 18.03pre124914.b9806751074 (Impala) multi-user?: yes sandbox: no version: nix-env (Nix) 1.11.16 channels(root): "nixos-18.03pre124914.b9806751074" nixpkgs: /nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs (so all works fine here) Git bisect blames 672bb6b4abd27d9b2796152522b54f5b82c9f76b, I don't really see anything suspicious in there. @LnL7 can you track this down with sysdig? I'm not sure how much time I'll have this weekend, it's pretty easy to reproduce if anybody else wants to take a shot at it. Tmux will die when the ssh connection closes. { config, lib, pkgs, ... }: { services.mingetty.autologinUser = "root"; virtualisation.graphics = false; users.users.foo = { uid = 1000; group = "foo"; isNormalUser = true; openssh.authorizedKeys.keys = [ "..." ]; }; users.groups.foo = { gid = 1000; }; environment.systemPackages = [ pkgs.tmux ]; services.openssh.enable = true; } export QEMU_NET_OPTS="hostfwd=tcp::3000-:22" nixos-rebuild build-vm -I nixos-config=foo.nix -I nixpkgs=. ./result/bin/run-nixos-vm ssh -i ./foo_rsa -p 3000<EMAIL_ADDRESS> Git bisect blames 672bb6b4abd27d9b2796152522b54f5b82c9f76b, but I don't really see anything suspicious in there. One thing that may be related is that it brings 1de98e85681e7d1028fe866fa220c05ce1ed842f, "plasma: 5.11.5 -> 5.12.1". @LnL7 ah now, this is a different one. I've seen that issue with nix-build, tmux works fine it uses /tmp/tmux-$UID for the socket. @Mic92 I experience this via ssh.... I tested it on 3 nixos servers... the 2 newer ones have that isse, an older one doesn't. Also non-nixos server don't have that issue either. I'm affected by this issue as well, except I'm using rxvt-unicode as the terminal Btw, it only happens if I start tmux as normal user. When I login by ssh as root user, start tmux, close the konsole tab and re-login, the tmux session is still running This can be fixed by doing loginctl enable-linger $USER, where $USER is your user. enable-linger does not change the behaviour. Note that there's also nothing systemd related in bad commit git bisect ended up in. I also tested it and the offending comit that I found was f5e96d3e1b7 xz: set CONFIG_SHELL to /bin/sh, fix retained reference to bootstrap I tested it now also on a live server - reverting back to commit 122fa75b2de619ceace4b94a613683e54c34ddd0 makes tmux run properly again. Ok, it might not be that commit as I used git log --oneline b9806751074..327a84749ed and those two commits are adjacent Maybe both enabling lingering and using systemd-run is needed? cc https://github.com/NixOS/nixpkgs/issues/15798#issuecomment-222352494 Hmm, I tried this but it failed to start due to permissions? Feb 26 05:52:42 gravity polkitd[8886]: Registered Authentication Agent for unix-process:9169:30559097 (system bus name :1.31 [/run/current-system/sw/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8) Feb 26 05:52:42 gravity systemd[5382]: run-rff29cc1b2fea4c84ad8787b5f7c40649.scope: Failed to add PIDs to scope's control group: Permission denied Feb 26 05:52:42 gravity systemd[5382]: run-rff29cc1b2fea4c84ad8787b5f7c40649.scope: Failed with result 'resources'. Feb 26 05:52:42 gravity systemd[5382]: Failed to start /run/current-system/sw/bin/screen hydra. Perhaps related: https://bbs.archlinux.org/viewtopic.php?id=227953 Is this really desirable default behavior? If so, should probably be mentioned in release notes.... From https://bbs.archlinux.org/viewtopic.php?pid=1724323#p1724323 possible hint: Ok, it seems that the distro package maintainer enabled systemd hybrid cgroup without kernel support. Or maybe -Ddefault-kill-user-processes=false? It does seem rather hostile default behavior. @dtzWill long long time ago, when this specific crazy change in systemd started affecting NixOS, we did add KillUserProcesses=no into logind.conf and never removed it. Because the default systemd behaviour is indeed hostile to any user who has a chance to install NixOS on their own. Oh, well hooray for that ^_^. Good to know. Chasing that: $ find -L /run/current-system -name "logind.conf" /run/current-system/etc/systemd/logind.conf /run/current-system/systemd/etc/systemd/logind.conf One of which sets KillUserProcesses=no nicely and the other does not. Hopefully/presumably the other is just an example/dead-end. Hmm. Erm, maybe this is the problem? Poking at loginctl to try to see what it is reading from or what config it ends up with led me to try: $ loginctl -p KillUserProcesses show-session KillUserProcesses=yes (I'm not a systemd expert, can someone take a look? Thanks!) @dtzWill Thanks for the debugging. This is probably a regression due to the recent systemd update. I can confirm that I have KillUserProcesses=no in /etc/systemd/logind.conf but loginctl -p KillUserProcesses show-session will print KillUserProcesses=yes. @fpletz @dtzWill I looked into that using sysdig it only tries to read ${pkgs.systemd}/etc/systemd/logind.conf, but not /etc/systemd/logind.conf. That's why configuration is never applied. I made a pull request to our systemd fork that fixes the issue.
2025-04-01T06:37:18.591604
2020-12-10T13:07:00
761225912
{ "authors": [ "kfollesdal", "nixos-discourse" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2070", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/106551" }
gharchive/pull-request
bumpver: 2020.1107 -> 2020.1108 Motivation for this change Update bumpver to last version Things done [ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [ ] NixOS [ ] macOS [x] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [x] Tested execution of all binary files (usually in ./result/bin/) [ ] Determined the impact on package closure size (by running nix path-info -S before and after) [x] Ensured that relevant documentation is up to date [x] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 106551 1 1 package built: bumpver This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/prs-ready-for-review/3032/405
2025-04-01T06:37:18.599387
2021-01-23T17:52:11
792616001
{ "authors": [ "cpcloud" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2071", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/110614" }
gharchive/pull-request
nixos/nomad: fix data_dir-default-not-propagating bug nixos/nomad: add newline nixos/nomad: move data_dir default setting to allow propagation of default Motivation for this change The value of data_dir in the nomad module was only set to its default if settings was not overridden at all. This PR fixes the issue so that you can override settings without having to specify the default value of data_dir. Things done [x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [x] NixOS [ ] macOS [ ] other Linux distributions [x] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) [ ] Determined the impact on package closure size (by running nix path-info -S before and after) [x] Ensured that relevant documentation is up to date [x] Fits CONTRIBUTING.md. Once https://github.com/NixOS/nixpkgs/pull/109761 is landed I will update the test here by removing the explicit data_dir setting. Once https://github.com/NixOS/nixpkgs/pull/109761 is landed I will update the test here by removing the explicit data_dir setting. Thanks for merging! Thanks for merging!
2025-04-01T06:37:18.604173
2021-02-07T15:50:19
802983934
{ "authors": [ "r-rmcgibbo", "spacefrogg" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2072", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/112309" }
gharchive/pull-request
sharness: Init at 1.1.0-dev Motivation for this change A simple portable shell library to write and run tests adhering to the Test Anything Protocol. Things done [x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [x] NixOS [ ] macOS [ ] other Linux distributions [x] Determined the impact on package closure size (by running nix path-info -S before and after) [x] Ensured that relevant documentation is up to date [x] Fits CONTRIBUTING.md. Updated. Result of nixpkgs-review pr 112309 at 44b06c61 run on aarch64-linux 1 1 package built: sharness
2025-04-01T06:37:18.615808
2021-02-17T18:46:49
810442813
{ "authors": [ "r-rmcgibbo", "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2073", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/113482" }
gharchive/pull-request
python37Packages.django-auth-ldap: 2.2.0 -> 2.3.0 Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript. meta.description for python37Packages.django-auth-ldap is: "Django authentication backend that authenticates against an LDAP service" meta.homepage for python37Packages.django-auth-ldap is: "https://github.com/django-auth-ldap/django-auth-ldap" meta.changelog for python37Packages.django-auth-ldap is: "" Updates performed Ran passthru.UpdateScript To inspect upstream changes Impact Checks done (click to expand) built on NixOS Warning: a test defined in passthru.tests did not pass 0 of 0 passed binary check by having a zero exit code. 0 of 0 passed binary check by having the new version present in output. found 2.3.0 with grep in /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0 directory tree listing: https://gist.github.com/7bf054df94955bd3decdb01135a3d207 du listing: https://gist.github.com/a1e51bef52b9f35a33d7a8dbbc37e91b Rebuild report (if merged into master) (click to expand) 9 total rebuild path(s) 3 package rebuild(s) 3 x86_64-linux rebuild(s) 3 i686-linux rebuild(s) 0 x86_64-darwin rebuild(s) 3 aarch64-linux rebuild(s) First fifty rebuilds by attrpath python37Packages.django-auth-ldap python38Packages.django-auth-ldap python39Packages.django-auth-ldap Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A python37Packages.django-auth-ldap https://github.com/r-ryantm/nixpkgs/archive/d158476f6d35ea676cb44fa0b125aa584a03a8b0.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0 ls -la /nix/store/zlh1jxl5jky18vsnb6qcfcmzd9wdjiy8-python3.7-django-auth-ldap-2.3.0/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 3 packages built: python37Packages.django-auth-ldap python38Packages.django-auth-ldap python39Packages.django-auth-ldap Maintainer pings cc @mmai for testing. Result of nixpkgs-review pr 113482 at d158476f run on aarch64-linux 1 3 packages built: python37Packages.django-auth-ldap python38Packages.django-auth-ldap python39Packages.django-auth-ldap
2025-04-01T06:37:18.622059
2021-02-24T01:43:14
814999722
{ "authors": [ "fabaff", "marsam" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2074", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/114198" }
gharchive/pull-request
zeek: 3.2.3 -> 3.2.4 Motivation for this change https://github.com/zeek/zeek/releases/tag/v3.2.4 Things done [ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [x] NixOS [x] macOS [ ] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [x] Tested execution of all binary files (usually in ./result/bin/) [ ] Determined the impact on package closure size (by running nix path-info -S before and after) [ ] Ensured that relevant documentation is up to date [x] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 114198 run on x86_64-linux 1 1 package built: zeek
2025-04-01T06:37:18.634665
2021-03-10T02:55:58
826994917
{ "authors": [ "r-ryantm", "risicle" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2075", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/115679" }
gharchive/pull-request
liburcu: 0.12.1 -> 0.12.2 Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/liburcu/versions. meta.description for liburcu is: "Userspace RCU (read-copy-update) library" meta.homepage for liburcu is: "https://lttng.org/urcu" meta.changelog for liburcu is: "" Updates performed Version update To inspect upstream changes Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed 0 of 0 passed binary check by having a zero exit code. 0 of 0 passed binary check by having the new version present in output. found 0.12.2 with grep in /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2 directory tree listing: https://gist.github.com/1f47726e757fb7834481a662e34e6f23 du listing: https://gist.github.com/0493fa32bbae6ae5eac2181764686ce9 Rebuild report (if merged into master) (click to expand) 105 total rebuild path(s) 46 package rebuild(s) 46 x86_64-linux rebuild(s) 23 i686-linux rebuild(s) 9 x86_64-darwin rebuild(s) 27 aarch64-linux rebuild(s) First fifty rebuilds by attrpath appgate-sdp aws-workspaces bareos bcachefs-tools ceph ceph-client ceph-dev codeql coreclr glusterfs knot-dns knot-resolver libceph liburcu libvmi lttng-tools lttng-ust multipath-tools netsniff-ng nfs-ganesha ntirpc osu-lazer powershell qemu_full qemu_xen qemu_xen-light qemu_xen_4_10 qemu_xen_4_10-light qubes-core-vchan-xen samba4Full sambaFull vscode-extensions.ms-python.python vscode-extensions.ms-vsliveshare.vsliveshare xen xen-light xen-slim xenPackages.xen-light xenPackages.xen-slim xenPackages.xen-vanilla xenPackages.xen_4_10-light xenPackages.xen_4_10-slim xenPackages.xen_4_10-vanilla xen_4_10 xen_4_10-light xen_4_10-slim zoxide Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A liburcu https://github.com/r-ryantm/nixpkgs/archive/af3185cdf18dea307f76a0550436c9e29b45f628.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2 ls -la /nix/store/pxnbsjsc4cdvssbdzsqlwp6lpc0k6jlw-liburcu-0.12.2/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 2 packages marked as broken and skipped: bareos samba4Full 8 packages failed to build: coreclr libvmi qemu_xen (qemu_xen_4_10) qemu_xen-light (qemu_xen_4_10-light) qubes-core-vchan-xen xen xen-light xen-slim 23 packages built: appgate-sdp aws-workspaces bcachefs-tools ceph ceph-client codeql glusterfs knot-dns knot-resolver libceph liburcu lttngTools (lttng-tools) lttngUst (lttng-ust) multipath-tools (multipath_tools) netsniff-ng nfs-ganesha ntirpc osu-lazer powershell qemu_full vscode-extensions.ms-python.python vscode-extensions.ms-vsliveshare.vsliveshare zoxide Maintainer pings cc @bjornfor for testing. nixpkgs-review successful on macos 10.14
2025-04-01T06:37:18.641968
2021-04-09T17:35:48
854726924
{ "authors": [ "fabaff", "r-rmcgibbo" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2076", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/118920" }
gharchive/pull-request
python3Packages.pyezviz: init at <IP_ADDRESS> Motivation for this change Python interface for for Ezviz cameras https://github.com/baqs/pyEzviz/ This is a Home Assistant dependency. Things done [x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [x] NixOS [ ] macOS [ ] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [x] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) [ ] Determined the impact on package closure size (by running nix path-info -S before and after) [ ] Ensured that relevant documentation is up to date [x] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 118920 run on x86_64-linux 1 2 packages built: python38Packages.pyezviz python39Packages.pyezviz Result of nixpkgs-review pr 118920 at cb564f15 run on aarch64-linux 1 2 packages built successfully: python38Packages.pyezviz python39Packages.pyezviz
2025-04-01T06:37:18.650372
2021-04-21T07:33:45
863540735
{ "authors": [ "LutzCle", "Mic92", "doronbehar" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2077", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/120032" }
gharchive/pull-request
zoom-us 5.6.13632.0328 -> 5.6.16775.0418 Motivation for this change zoom-us currently is in a broken state. Version 5.6.13632.0328 is blocked from participating in calls, and fails with a "please upgrade to the latest version" message. At the same time, the tar file that is supposed to be version 5.6.16775.0418 is bit-identical to the previous version. Thus, no upgrade path to fix the issue is currently available using a tar file. In consequence, this PR upgrades to the current version using the .deb file provided by Zoom for Debian/Ubuntu. Things done [x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [x] NixOS [ ] macOS [ ] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [x] Tested execution of all binary files (usually in ./result/bin/) [ ] Determined the impact on package closure size (by running nix path-info -S before and after) [ ] Ensured that relevant documentation is up to date [ ] Fits CONTRIBUTING.md. backport: https://github.com/NixOS/nixpkgs/pull/120038 Update: Yesterday I submitted a ticket with Zoom. The tar file has now been fixed, and I have verified that upgrading via the tar works again. Update: Yesterday I submitted a ticket with Zoom. The tar file has now been fixed, and I have verified that upgrading via the tar works again. Thanks for the update. Using the tarball again in https://github.com/NixOS/nixpkgs/pull/120243 - targeting master and in https://github.com/NixOS/nixpkgs/pull/120242 a backport + fix for the stable channel.
2025-04-01T06:37:18.658204
2021-06-08T19:26:06
915389060
{ "authors": [ "jonringer", "vcunat" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2078", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/126251" }
gharchive/pull-request
[21.05] Staging next Motivation for this change Jobset: https://hydra.nixos.org/jobset/nixpkgs/staging-21.05 previous 21.05 staging next PR: #124341 Things done [ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [ ] NixOS [ ] macOS [ ] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) 21.11 Release Notes [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. I think I'll pause these stable branch staging-next's until hydra recovers. (<60k queued builds) I don't think that is needed. Typically the phase of jobset just discovering builds already in cache is quite fast. I don't think that is needed. Typically the phase of jobset just discovering builds already in cache is quite fast. EDIT: it seemed (mostly?) done when I first posted this comment already. staging-next-21.05 shares haven't been dialed back from stabilizing the release. Most jobsets have <1000 shares, staging-next-21.05 has 20M https://hydra.nixos.org/jobset/nixpkgs/staging-next-21.05#tabs-configuration OK, that might be set lower now if there's nothing really urgent, I suppose, but it seems just a matter of relative priorities.
2025-04-01T06:37:18.668776
2021-07-03T14:37:10
936267060
{ "authors": [ "bobby285271" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2079", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/129136" }
gharchive/pull-request
nixos/doc: convert "Chapter 58. Writing NixOS Modules" to CommonMark Note for reviewers Thank you for reviewing this PR. :-) This PR also fixes a small typo in Example 58.12, it should be "Definition of attribute sets of submodules" :-) The conversion of the examples is done manually, I handle examples in the following way: The example itself: ::: {#ex-the-id-of-the-example .example} ::: {.title} **Example: The Name of the Example** ::: The content of the example. ::: Mentioning a example: See [Example: The Name of the Example](#ex-the-id-of-the-example) for more details. It seems that CommonMark -> DocBook (using Pandoc) won't convert .example into <example></example>, but I still used .example because DocBook will be dropped one day and CommonMark -> HTML (using Pandoc) will produce <div class="example"></div> which I think will be fine to handle. If you have a better idea about how to handle examples feel free to comment, thanks! Motivation for this change Related GitHub project Related Discourse post Things done Do conversion of eight files from DocBook to CommonMark per RFC 72. nixos/doc/manual/development/option-declarations.xml nixos/doc/manual/development/option-types.xml nixos/doc/manual/development/option-def.xml nixos/doc/manual/development/meta-attributes.xml nixos/doc/manual/development/importing-modules.xml nixos/doc/manual/development/replace-modules.xml nixos/doc/manual/development/freeform-modules.xml nixos/doc/manual/development/settings-options.xml [ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [x] NixOS [ ] macOS [ ] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) 21.11 Release Notes (or backporting 21.05 Relase notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Will update all options links (if any) to only use the URI fragment tomorrow.
2025-04-01T06:37:18.670943
2021-08-10T14:03:39
965018550
{ "authors": [ "vcunat" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2080", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/133385" }
gharchive/pull-request
zeroadPackages.zeroad-unwrapped: make it build on Hydra This time for real, I hope. I'm sorry for my incomplete advice; the explicit dontRecurseIntoAttrs confused me about what's the default behavior in here. Things done (nothing applies... no hashes change) Oops, duplicate of https://github.com/NixOS/nixpkgs/pull/133379 I checked but a bit earlier...
2025-04-01T06:37:18.683097
2021-08-15T07:34:38
971071995
{ "authors": [ "cdepillabout", "samuelrivas" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2081", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/134124" }
gharchive/pull-request
haskellPackages.readline: fix Setup.hs to work with Cabal 3 See https://github.com/NixOS/nixpkgs/pull/111985/ for previous discussion Motivation for this change readline is broken for Cabal3 build. I fixed it previously in this pull request, but the fix seems to have disappeared. I just reapplied it. Is there a better way to keep this fix in place for the future? As you can seen in the previous PR, we tried to reach the maintainers of this package but we didn't succeed. Things done [x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux) Built on platform(s) [ ] NixOS [ ] macOS [x] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [X] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) 21.11 Release Notes (or backporting 21.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [X] Fits CONTRIBUTING.md. Is there a better way to keep this fix in place for the future? It might be a better idea to send this PR to the haskell-updates branch, and then back-port this PR after it is merged in there. Each nixos release is branched-off from the master branch here in nixpkgs. https://github.com/NixOS/nixpkgs/pull/111985 was sent to release-20.09, so it never ended up in master. Sorry for not let telling you about this at the time. If you send a PR to haskell-updates, then it should get merged into master. I think there is some sort of action that lets us automatically create a backport, so hopefully it is not too much additional work for you. As you can seen in the previous PR, we tried to reach the maintainers of this package but we didn't succeed. One thing I was wondering, is there a repo for this readline package on github? If so, can you create an issue or send a PR there and link to it from a comment in the code? If you are able to send a PR, then you should also just be able to fetchpatch from that PR, which would mean that we wouldn't need to carry this patch around in nixpkgs. If there is no upstream repo, the we'll probably have to carry around this patch in nixpkgs. If you send a PR to haskell-updates, then it should get merged into master. I think there is some sort of action that lets us automatically create a backport, so hopefully it is not too much additional work for you. Ok, thanks. I'll look into sending this to haskell-updates then. One thing I was wondering, is there a repo for this readline package on github? If so, can you create an issue or send a PR there and link to it from a comment in the code? If you are able to send a PR, then you should also just be able to fetchpatch from that PR, which would mean that we wouldn't need to carry this patch around in nixpkgs. If there is no upstream repo, the we'll probably have to carry around this patch in nixpkgs. I could not find any upstream repo for this package the other time, but from a bit of googling I believe Jan Stolarek may be the maintainer, I have just sent an email to them. Otherwise I could also upload the source to my github and host the patch there, but that is also relatively ugly as it would end up being a sort of fork from hackage. Should I close this PR then? I'll open another one to haskell-updates I went ahead and created the new PR https://github.com/NixOS/nixpkgs/pull/134295. Still trying to find a maintainer in parallel :)
2025-04-01T06:37:18.690095
2021-08-22T16:29:46
976416245
{ "authors": [ "figsoda", "yusdacra" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2082", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/135311" }
gharchive/pull-request
helix: 0.4.0 -> 0.4.1 Motivation for this change Update helix to 0.4.1 Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [x] Tested execution of all binary files (usually in ./result/bin/) 21.11 Release Notes (or backporting 21.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [x] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 135311 run on x86_64-linux 1 1 package built: helix
2025-04-01T06:37:18.715217
2021-09-11T03:54:55
993739079
{ "authors": [ "r-rmcgibbo", "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2083", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/137347" }
gharchive/pull-request
python38Packages.databricks-connect: 8.1.11 -> 8.1.12 Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript. meta.description for python38Packages.databricks-connect is: "Client for connecting to remote Databricks clusters" meta.homepage for python38Packages.databricks-connect is: "https://pypi.org/project/databricks-connect" meta.changelog for python38Packages.databricks-connect is: "" Updates performed Ran passthru.UpdateScript To inspect upstream changes Impact Checks done (click to expand) built on NixOS Warning: a test defined in passthru.tests did not pass /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/beeline passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/beeline.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/docker-image-tool.sh passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/find-spark-home passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/find-spark-home.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/find_spark_home.py passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/load-spark-env.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/load-spark-env.sh passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark-bazel passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/pyspark2.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/quicksilver passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/run-example passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/run-example.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-class passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-class.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-class2.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell-bazel passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-shell2.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-sql passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-sql.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-sql2.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-submit passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-submit.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/spark-submit2.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/sparkR passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/sparkR.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/sparkR2.cmd passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/databricks-connect passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/.find_spark_home.py-wrapped passed the binary check. /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin/.databricks-connect-wrapped passed the binary check. 7 of 34 passed binary check by having a zero exit code. 32 of 34 passed binary check by having the new version present in output. found 8.1.12 with grep in /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12 found 8.1.12 in filename of file in /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12 directory tree listing: https://gist.github.com/1e7f7e09854e24ae5a783adad9b6f8c8 du listing: https://gist.github.com/9838824d56b713b18b4f189666c6a0ea Rebuild report (if merged into master) (click to expand) 8 total rebuild path(s) 2 package rebuild(s) 2 x86_64-linux rebuild(s) 2 i686-linux rebuild(s) 2 x86_64-darwin rebuild(s) 2 aarch64-linux rebuild(s) First fifty rebuilds by attrpath python38Packages.databricks-connect python39Packages.databricks-connect Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A python38Packages.databricks-connect https://github.com/r-ryantm/nixpkgs/archive/1b9987bfd9678179115c9cacd444e7bad8df3a36.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12 ls -la /nix/store/j94c31wa851c6vclbsfnj18k0750hgkr-python3.8-databricks-connect-8.1.12/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 2 packages built: python38Packages.databricks-connect python39Packages.databricks-connect Maintainer pings cc @kfollesdal for testing. Result of nixpkgs-review pr 137347 at 1b9987bf run on aarch64-linux 1 2 packages built successfully: python38Packages.databricks-connect python39Packages.databricks-connect
2025-04-01T06:37:18.721725
2021-09-17T04:39:03
998931973
{ "authors": [ "VergeDX", "bobby285271", "figsoda" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2084", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/138225" }
gharchive/pull-request
vscode-extensions.mvllow.rose-pine: init at 1.3.6 Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [x] Tested execution of all binary files (usually in ./result/bin/) 21.11 Release Notes (or backporting 21.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [x] Fits CONTRIBUTING.md. @ofborg eval Result of nixpkgs-review pr 138225 run on x86_64-linux 1 1 package built: vscode-extensions.mvllow.rose-pine
2025-04-01T06:37:18.730249
2021-10-09T10:46:26
1021676078
{ "authors": [ "Mindavi", "fabaff", "risicle" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2085", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/141090" }
gharchive/pull-request
libwebsockets: 4.2.1 -> 4.3.0 Motivation for this change Update to latest upstream release 4.3.0 Change log: https://libwebsockets.org/git/libwebsockets/tree/changelog Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) 21.11 Release Notes (or backporting 21.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [x] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 141090 run on x86_64-linux 1 1 package failed to build: driftnet 4 packages built: ardour janus-gateway libwebsockets (libwebsockets_4_3) ttyd On nixos x86_64: builder for '/nix/store/20qgg23xpy1ykam4hriv1f7bixd4ia2x-driftnet-1.3.0.drv' failed with exit code 2; last 10 log lines: 194 | { NULL, NULL } // sentinel | ^ httpd.c:194:9: note: (near initialization for 'mount') httpd.c:194:9: warning: excess elements in struct initializer httpd.c:194:9: note: (near initialization for 'mount') make[2]: *** [Makefile:375: httpd.o] Error 1 make[2]: Leaving directory '/build/source/src/http_display' make[1]: *** [Makefile:454: all-recursive] Error 1 make[1]: Leaving directory '/build/source/src' make: *** [Makefile:428: all-recursive] Error 1 Diff LGTM. Haven't found time to test this yet. Upstream appears to have enabled -Werror by default, which I'd like to have disabled to decrease the burden for compiler upgrades. Otherwise changelog looks ok too.
2025-04-01T06:37:18.738786
2021-11-26T17:12:25
1064704021
{ "authors": [ "zowoq" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2086", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/147512" }
gharchive/pull-request
skopeo: 1.5.1 -> 1.5.2 https://github.com/containers/skopeo/releases/tag/v1.5.2 Motivation for this change Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [x] Tested basic functionality of all binary files (usually in ./result/bin/) 21.11 Release Notes (or backporting 21.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes [x] Fits CONTRIBUTING.md. @ofborg eval
2025-04-01T06:37:18.750120
2022-01-20T11:34:33
1109190975
{ "authors": [ "fabaff", "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2087", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/155856" }
gharchive/pull-request
python310Packages.pyvlx: 0.2.19 -> 0.2.20 Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript. meta.description for python310Packages.pyvlx is: "Python client to work with Velux units" meta.homepage for python310Packages.pyvlx is: "https://github.com/Julius2342/pyvlx" meta.changelog for python310Packages.pyvlx is: "" Updates performed Ran passthru.UpdateScript To inspect upstream changes Release on GitHub Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed 0 of 0 passed binary check by having a zero exit code. 0 of 0 passed binary check by having the new version present in output. found 0.2.20 with grep in /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20 found 0.2.20 in filename of file in /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20 Rebuild report (if merged into master) (click to expand) 4 total rebuild path(s) 2 package rebuild(s) 2 x86_64-linux rebuild(s) 2 x86_64-darwin rebuild(s) First fifty rebuilds by attrpath python310Packages.pyvlx python39Packages.pyvlx Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A python310Packages.pyvlx https://github.com/r-ryantm/nixpkgs/archive/61aa5d293b474733dda8a749a3e31ce635f40707.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20 ls -la /nix/store/j5nwiid099imnn0iiqranwpw4p3b3xjz-python3.10-pyvlx-0.2.20/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 2 packages built: python310Packages.pyvlx python39Packages.pyvlx Maintainer pings cc @fabaff for testing. Result of nixpkgs-review pr 155856 run on x86_64-linux 1 2 packages built: python310Packages.pyvlx python39Packages.pyvlx
2025-04-01T06:37:18.761538
2022-02-17T04:57:00
1140877498
{ "authors": [ "davidak", "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2088", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/160424" }
gharchive/pull-request
phoronix-test-suite: 10.8.1 -> 10.8.2 Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/phoronix-test-suite/versions. meta.description for phoronix-test-suite is: "Open-Source, Automated Benchmarking" meta.homepage for phoronix-test-suite is: "https://www.phoronix-test-suite.com/" meta.changelog for phoronix-test-suite is: "" Updates performed Version update To inspect upstream changes Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed Warning: no invocation of /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2/bin/.phoronix-test-suite-wrapped had a zero exit code or showed the expected version Warning: no invocation of /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2/bin/phoronix-test-suite had a zero exit code or showed the expected version 0 of 2 passed binary check by having a zero exit code. 0 of 2 passed binary check by having the new version present in output. found 10.8.2 with grep in /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2 found 10.8.2 in filename of file in /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2 Rebuild report (if merged into master) (click to expand) 2 total rebuild path(s) 1 package rebuild(s) 1 x86_64-linux rebuild(s) 1 x86_64-darwin rebuild(s) First fifty rebuilds by attrpath phoronix-test-suite Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A phoronix-test-suite https://github.com/r-ryantm/nixpkgs/archive/a7c9fa3eab823271cbc5ece7771c48d8ccca4ceb.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2 ls -la /nix/store/hpqv538cx5cwa7ky5x90bplq93bbcw3y-phoronix-test-suite-10.8.2/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 1 package built: phoronix-test-suite Maintainer pings cc @davidak for testing. Result of nixpkgs-review pr 160424 run on x86_64-linux 1 1 package built: phoronix-test-suite
2025-04-01T06:37:18.770289
2016-07-21T15:47:20
166853272
{ "authors": [ "garbas", "mimadrid", "obadz", "vcunat" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2089", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/17152" }
gharchive/pull-request
curl: 7.47.1 -> 7.50.0 Motivation for this change Update curl to the last version Things done [X] Tested using sandboxing (nix.useChroot on NixOS, or option build-use-chroot in nix.conf on non-NixOS) Built on platform(s) [X] NixOS [ ] OS X [ ] Linux [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip" [X] Tested execution of all binary files (usually in ./result/bin/) [X] Fits CONTRIBUTING.md. @vcunat, do you want to pull this into staging? I'm confident curl doesn't cause a mass rebuild. The change seems safe API-wise, too. In that, merging now as it seems to build and runs fine. @aycanirican pointed out in https://github.com/NixOS/nixpkgs/commit/fa03b541b2e6cd62761f1e9778654de99b0d4ec6#commitcomment-18462996 that this broke aws-sdk-cpp. /tmp/nix-build-aws-sdk-cpp-0.13.11.drv-0/aws-sdk-cpp-0.13.11-src/aws-cpp-sdk-core/source/http/curl/CurlHandleContainer.cpp:123:5: error: invalid conversion from 'void*' to 'CURL* {aka Curl_easy*}' [-fpermissive] curl_easy_setopt(handle, CURLOPT_NOSIGNAL, 1L); ^ In file included from /nix/store/idqyp6skbp1mp3w8xz3babcndcsnn6ax-curl-7.50.0-dev/include/curl/curl.h:2420:0, Bumping the version of aws-sdk-cpp does not fix the issue. Choices are either to revert to to create a parallel version of curl just for aws-sdk-cpp until they bump. Thoughts? Might make sense to wait until hydra comes back up to see the extent of what was broken by this commit NIX_CFLAGS_COMPILE = '-fpermissive' should fix those cases, as suggested by the error message. Thanks, done! I'm confident curl doesn't cause a mass rebuild. Now I see it does cause a nontrivial rebuild due to systemd indirectly depending on it. It wasn't the case about a year ago... this broke nix on darwin and many other packages because of https://github.com/curl/curl/issues/926. lets stabilize this via staging please. otherwise others can not work on other packages in nixpkgs.
2025-04-01T06:37:18.779059
2022-07-04T17:47:35
1293444410
{ "authors": [ "Luflosi", "nixos-discourse" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2090", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/180148" }
gharchive/pull-request
nixos/nginx: fix broken listenAddresses example Description of changes When using the example without the square brackets, nginx fails to start: nginx-pre-start: nginx: [emerg] invalid port in "::1:80" of the "listen" directive in /nix/store/xyz-nginx.conf:29 nginx-pre-start: nginx: configuration file /nix/store/xyz-nginx.conf test failed Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 22.11 Release Notes (or backporting 22.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes [x] Fits CONTRIBUTING.md. This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/prs-ready-for-review/3032/1026
2025-04-01T06:37:18.799447
2022-07-29T22:36:00
1322736358
{ "authors": [ "onny", "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2091", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/183843" }
gharchive/pull-request
sensu-go-cli: 6.6.6 -> 6.7.5 Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/sensu/sensu-go/releases. meta.description for sensu-go-cli is: "Open source monitoring tool for ephemeral infrastructure & distributed applications" meta.homepage for sensu-go-cli is: "https://sensu.io" meta.changelog for sensu-go-cli is: "" Updates performed Golang update To inspect upstream changes Release on GitHub Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found 6.7.4 with grep in /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4 found 6.7.4 in filename of file in /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4 Rebuild report (if merged into master) (click to expand) 3 total rebuild path(s) 3 package rebuild(s) First fifty rebuilds by attrpath sensu-go-agent sensu-go-backend sensu-go-cli Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A sensu-go-cli https://github.com/r-ryantm/nixpkgs/archive/20673179e3e10849c9410b6f37decc9a8a0681fe.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4 ls -la /nix/store/l52i5q4w45n8wbyn2gdi5dxdc2sm0fsj-sensu-go-cli-6.7.4/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 3 packages built: sensu-go-agent sensu-go-backend sensu-go-cli Maintainer pings cc @thefloweringash for testing. Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/sensu/sensu-go/releases. meta.description for sensu-go-cli is: "Open source monitoring tool for ephemeral infrastructure & distributed applications" meta.homepage for sensu-go-cli is: "https://sensu.io" meta.changelog for sensu-go-cli is: "" Updates performed Golang update To inspect upstream changes Release on GitHub Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found 6.7.5 with grep in /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5 found 6.7.5 in filename of file in /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5 Rebuild report (if merged into master) (click to expand) 3 total rebuild path(s) 3 package rebuild(s) First fifty rebuilds by attrpath sensu-go-agent sensu-go-backend sensu-go-cli Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A sensu-go-cli https://github.com/r-ryantm/nixpkgs/archive/95898d794e963265790ac427f7c1566356609b19.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5 ls -la /nix/store/6kgzzawjry963qdc4ds172v4clshrp52-sensu-go-cli-6.7.5/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 3 packages built: sensu-go-agent sensu-go-backend sensu-go-cli Maintainer pings cc @thefloweringash for testing. Result of nixpkgs-review pr 183843 run on x86_64-linux 1 3 packages built: sensu-go-agent sensu-go-backend sensu-go-cli
2025-04-01T06:37:18.809551
2022-08-17T01:48:22
1341062545
{ "authors": [ "onny", "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2092", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/187055" }
gharchive/pull-request
xcp: 0.9.0 -> 0.9.1 Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/xcp/versions. meta.description for xcp is: "An extended cp(1)" meta.homepage for xcp is: "https://github.com/tarka/xcp" meta.changelog for xcp is: "" Updates performed Rust version update To inspect upstream changes Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found 0.9.1 with grep in /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1 found 0.9.1 in filename of file in /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1 Rebuild report (if merged into master) (click to expand) 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath xcp Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A xcp https://github.com/r-ryantm/nixpkgs/archive/3c5c3ce1aad4e3b7ec6c349718262e4d91b3af33.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1 ls -la /nix/store/l8fiyfhabr2hqka9rnz563gb8hxghr0s-xcp-0.9.1/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 1 package built: xcp Maintainer pings cc @legendofmiracles for testing. Result of nixpkgs-review pr 187055 run on x86_64-linux 1 1 package built: xcp
2025-04-01T06:37:18.815426
2016-10-23T14:18:27
184692663
{ "authors": [ "Mic92", "copumpkin", "mikesperber", "vcunat" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2093", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/19800" }
gharchive/pull-request
Fix texlive on darwin Motivation for this change texlive-2016 would not build on Darwin. Things done Unbreak build of clisp on Darwin (on which xindy depends on which texlive depends), which previously was Linux only. Add a dependency to xindy to libiconv. [ ] Tested using sandboxing (nix.useSandbox on NixOS, or option build-use-sandbox in nix.conf on non-NixOS) Built on platform(s) [ ] NixOS [x] OS X [ ] Linux [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) [x] Fits CONTRIBUTING.md. ping @vbgl @matthewbauer @LnL7 cc @acowley Thanks for the review! Done. It's not perfect, apparently: https://github.com/NixOS/nixpkgs/issues/20062
2025-04-01T06:37:18.840776
2022-11-02T17:33:29
1433531838
{ "authors": [ "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2094", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/199198" }
gharchive/pull-request
klipper: unstable-2022-10-25 -> unstable-2022-11-02 Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript. meta.description for klipper is: "The Klipper 3D printer firmware" meta.homepage for klipper is: "https://github.com/KevinOConnor/klipper" meta.changelog for klipper is: "" Updates performed Ran passthru.UpdateScript To inspect upstream changes Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found unstable-2022-10-31 in filename of file in /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31 Rebuild report (if merged into master) (click to expand) 4 total rebuild path(s) 4 package rebuild(s) First fifty rebuilds by attrpath klipper klipper-firmware klipper-flash klipper-genconf Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A klipper https://github.com/r-ryantm/nixpkgs/archive/431344ba195f2df9e437cf2bdbdf0e286b18ce0d.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31 ls -la /nix/store/l3mgmrh3i67r56fbmrw7gsywcmpny728-klipper-unstable-2022-10-31/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 4 packages built: klipper klipper-firmware klipper-flash klipper-genconf Maintainer pings cc @lovesegfault @zhaofengli @cab404 for testing. Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript. meta.description for klipper is: "The Klipper 3D printer firmware" meta.homepage for klipper is: "https://github.com/KevinOConnor/klipper" meta.changelog for klipper is: "" Updates performed Ran passthru.UpdateScript To inspect upstream changes Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found unstable-2022-11-02 in filename of file in /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02 Rebuild report (if merged into master) (click to expand) 4 total rebuild path(s) 4 package rebuild(s) First fifty rebuilds by attrpath klipper klipper-firmware klipper-flash klipper-genconf Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A klipper https://github.com/r-ryantm/nixpkgs/archive/8bcdd0df374d74eada46607edc9d6c6258f30f60.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02 ls -la /nix/store/xm7f6vxgh4r6mixgj7fwbf4xs8fna9gl-klipper-unstable-2022-11-02/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 4 packages built: klipper klipper-firmware klipper-flash klipper-genconf Maintainer pings cc @lovesegfault @zhaofengli @cab404 for testing. Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript. meta.description for klipper is: "The Klipper 3D printer firmware" meta.homepage for klipper is: "https://github.com/KevinOConnor/klipper" meta.changelog for klipper is: "" Updates performed Ran passthru.UpdateScript To inspect upstream changes Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found unstable-2022-11-03 in filename of file in /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03 Rebuild report (if merged into master) (click to expand) 4 total rebuild path(s) 4 package rebuild(s) First fifty rebuilds by attrpath klipper klipper-firmware klipper-flash klipper-genconf Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A klipper https://github.com/r-ryantm/nixpkgs/archive/ace92a6aec0b1b00f082a17c6d4cbbb3736418c4.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03 ls -la /nix/store/s60vnjq931xkvh2hrbrhwfnszhm5b7iw-klipper-unstable-2022-11-03/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 4 packages built: klipper klipper-firmware klipper-flash klipper-genconf Maintainer pings cc @lovesegfault @zhaofengli @cab404 for testing.
2025-04-01T06:37:18.852672
2022-12-18T04:21:03
1501738379
{ "authors": [ "clerie", "figsoda", "joseluisq", "nixos-discourse" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2095", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/206662" }
gharchive/pull-request
static-web-server: init at 2.14.1 Description of changes https://sws.joseluisq.net https://github.com/static-web-server/static-web-server Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [x] x86_64-darwin [x] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [x] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [x] Tested basic functionality of all binary files (usually in ./result/bin/) 23.05 Release Notes (or backporting 22.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes [x] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 206662 run on x86_64-linux 1 1 package built: static-web-server Huh, merged before finishing review 😅 Anyway, started server and it returned content as expected :) SWS maintainer here. Just a bit late thanks to all you guys and specially @figsoda for the effort to incorporate SWS into nixpkgs ⚡ It should be mentioned in the installation doc section soon. This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/testing-a-new-module-and-package-without-breaking-my-stable-nixos-install/27129/1
2025-04-01T06:37:18.862976
2023-01-31T11:11:19
1564108124
{ "authors": [ "JulienMalka", "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2096", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/213751" }
gharchive/pull-request
praat: 6.3.04 -> 6.3.05 Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/praat/praat/releases. meta.description for praat is: Doing phonetics by computer meta.homepage for praat is: https://www.fon.hum.uva.nl/praat/ Updates performed Version update To inspect upstream changes Release on GitHub Compare changes on GitHub Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found 6.3.05 with grep in /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05 found 6.3.05 in filename of file in /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05 Rebuild report (if merged into master) (click to expand) 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath praat Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A praat https://github.com/r-ryantm/nixpkgs/archive/6616e69312ec69c0c7246e6cb150928f662466b0.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05 ls -la /nix/store/wa6j5adglnssdspjnl47d99y86xx7cnn-praat-6.3.05/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 1 package built: praat Maintainer pings cc @orivej for testing. Result of nixpkgs-review pr 213751 run on x86_64-linux 1 1 package built: praat
2025-04-01T06:37:18.872639
2023-05-07T12:02:40
1699033395
{ "authors": [ "fabaff" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2097", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/230507" }
gharchive/pull-request
python311Packages.mkdocstrings-python: 0.9.0 -> 0.10.0 Changelog: https://github.com/mkdocstrings/python/blob/0.10.0/CHANGELOG.md Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 23.05 Release Notes (or backporting 22.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 230507 run on x86_64-linux 1 1 package marked as broken and skipped: netbox_3_3 5 packages built: netbox python310Packages.mkdocstrings-python python310Packages.mkdocstrings-python.dist python311Packages.mkdocstrings-python python311Packages.mkdocstrings-python.dist
2025-04-01T06:37:18.880981
2023-05-14T17:52:12
1709022868
{ "authors": [ "SuperSandro2000" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2098", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/231891" }
gharchive/pull-request
nixos/no-x-libs: add gst-plugins-bad, gst-plugins-rs Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 23.05 Release Notes (or backporting 22.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. The gst-plugins-base hack is very similar to https://github.com/NixOS/nixpkgs/pull/231185/files#diff-bd924545a322bae41a5f57f50113281417c8ea50fec7801f606840410f492164R169
2025-04-01T06:37:18.889908
2023-05-15T14:49:05
1710260873
{ "authors": [ "hellwolf", "nixos-discourse" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2099", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/232056" }
gharchive/pull-request
owncloud: 3.2.1 -> 4.0.0 Description of changes Upgrade owncloud 3.2.1 -> 4.0.0 Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [-] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [x] Tested basic functionality of all binary files (usually in ./result/bin/) 23.05 Release Notes (or backporting 22.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. @ofborg build owncloud This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/prs-ready-for-review/3032/2218
2025-04-01T06:37:18.897823
2023-05-26T23:56:25
1728353101
{ "authors": [ "wegank" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2100", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/234329" }
gharchive/pull-request
sonic-server: migrate to bindgenHook Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [x] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 23.05 Release Notes (or backporting 22.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. @ofborg build sonic-server sonic-server.passthru.tests
2025-04-01T06:37:18.906581
2023-06-23T14:01:32
1771517514
{ "authors": [ "pbek", "totoroot" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2101", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/239375" }
gharchive/pull-request
qownnotes: 23.6.5 -> 23.6.6 Semi-automatic update generated by nixpkgs-update tools. This update was made based on information from repology.org. meta.description for qownnotes is: Plain-text file notepad and todo-list manager with markdown support and Nextcloud/ownCloud integration meta.homepage for qownnotes is: https://www.qownnotes.org/ meta.changelog for qownnotes is: https://www.qownnotes.org/changelog.html Updates performed Version update To inspect upstream changes Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found 23.6.6 with grep in /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6 found 23.6.6 in filename of file in /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6 Rebuild report (if merged into master) (click to expand) 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath qownnotes Instructions to test this update (click to expand) Build yourself: nix-build -A qownnotes https://github.com/pbek/nixpkgs/archive/a9c0f2bd83553203465466e942052f93d8d2e391.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6 ls -la /nix/store/j75gaa5qkar1rfiz7qcdqpbqcpfwcy37-qownnotes-23.6.6/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 1 package built: qownnotes Maintainer pings cc @pbek @totoroot for testing. Result of nixpkgs-review pr 239375 run on x86_64-linux 1 1 package built: qownnotes
2025-04-01T06:37:18.942057
2023-07-12T19:38:04
1801635804
{ "authors": [ "r-ryantm" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2102", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/243134" }
gharchive/pull-request
libplacebo: 5.264.1 -> 6.292.1 Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/project/libplacebo/versions. meta.description for libplacebo is: Reusable library for GPU-accelerated video/image rendering primitives meta.homepage for libplacebo is: https://code.videolan.org/videolan/libplacebo meta.changelog for libplacebo is: https://code.videolan.org/videolan/libplacebo/-/tags/v6.292.0 Updates performed Version update To inspect upstream changes Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found 6.292.0 with grep in /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0 found 6.292.0 in filename of file in /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0 Rebuild report (if merged into master) (click to expand) 144 total rebuild path(s) 144 package rebuild(s) First fifty rebuilds by attrpath MIDIVisualizer adl ani-cli anime-downloader anki arcanPackages.all-wrapped arcanPackages.arcan arcanPackages.arcan-wrapped arcanPackages.cat9-wrapped arcanPackages.durden-wrapped arcanPackages.ffmpeg arcanPackages.pipeworld-wrapped arcanPackages.prio-wrapped arcanPackages.xarcan audiobookshelf celluloid corrscope cplay-ng curseradio deepin.dde-gsettings-schemas deepin.deepin-movie-reborn deepin.deepin-music deepin.deepin-voice-note dmlive dra-cla eaglemode ff2mpv ffcast ffmpeg-full ffmpeg_4-full ffmpeg_5-full ffmpeg_6-full gonic handbrake haruna hydrus hypnotix imagination jellyfin jellyfin-ffmpeg jellyfin-media-player jellyfin-mpv-shim jftui kaffeine klipperscreen kphotoalbum libplacebo libsForQt5.elisa libsForQt5.kdenlive libsForQt5.phonon-backend-vlc Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A libplacebo https://github.com/r-ryantm/nixpkgs/archive/5836cbc28d5362a4ad467fb48e533ad28ebd10f0.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0 ls -la /nix/store/lyr948g6pc8sqxnv2xlivxk919vmk4h9-libplacebo-6.292.0/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 1 package marked as broken and skipped: obs-studio-plugins.obs-hyperion 134 packages failed to build: MIDIVisualizer adl ani-cli anime-downloader anki arcanPackages.all-wrapped arcanPackages.arcan arcanPackages.arcan-wrapped arcanPackages.cat9-wrapped arcanPackages.durden-wrapped arcanPackages.ffmpeg arcanPackages.pipeworld-wrapped arcanPackages.prio-wrapped arcanPackages.xarcan audiobookshelf celluloid corrscope cplay-ng curseradio deepin.dde-gsettings-schemas deepin.deepin-movie-reborn deepin.deepin-music deepin.deepin-voice-note dmlive dra-cla eaglemode ff2mpv ffcast ffmpeg_6-full gonic handbrake haruna hydrus hypnotix imagination jellyfin jellyfin-ffmpeg jellyfin-media-player jellyfin-mpv-shim jftui kaffeine klipperscreen kphotoalbum libsForQt5.elisa libsForQt5.kdenlive libsForQt5.phonon-backend-vlc libsForQt5.plasmatube libsForQt5.soundkonverter libvlc liquidsoap manim megaglest memento minitube mnemosyne mpc-qt mpv mpv-unwrapped mpvScripts.inhibit-gnome mpvScripts.mpris mpvScripts.thumbfast mpvpaper obs-studio obs-studio-plugins.advanced-scene-switcher obs-studio-plugins.droidcam-obs obs-studio-plugins.input-overlay obs-studio-plugins.looking-glass-obs obs-studio-plugins.obs-3d-effect obs-studio-plugins.obs-backgroundremoval obs-studio-plugins.obs-command-source obs-studio-plugins.obs-gradient-source obs-studio-plugins.obs-gstreamer obs-studio-plugins.obs-livesplit-one obs-studio-plugins.obs-move-transition obs-studio-plugins.obs-multi-rtmp obs-studio-plugins.obs-mute-filter obs-studio-plugins.obs-ndi obs-studio-plugins.obs-nvfbc obs-studio-plugins.obs-pipewire-audio-capture obs-studio-plugins.obs-rgb-levels-filter obs-studio-plugins.obs-scale-to-sound obs-studio-plugins.obs-shaderfilter obs-studio-plugins.obs-source-clone obs-studio-plugins.obs-source-record obs-studio-plugins.obs-source-switcher obs-studio-plugins.obs-teleport obs-studio-plugins.obs-text-pthread obs-studio-plugins.obs-transition-table obs-studio-plugins.obs-tuna obs-studio-plugins.obs-vaapi obs-studio-plugins.obs-vertical-canvas obs-studio-plugins.obs-vintage-filter obs-studio-plugins.obs-vkcapture obs-studio-plugins.obs-websocket obs-studio-plugins.waveform obs-studio-plugins.wlrobs peek plex-media-player plex-mpv-shim printrun pympress python310Packages.aigpy python310Packages.dm-sonnet python310Packages.moderngl-window python310Packages.mpv python310Packages.pydub python310Packages.pyglet python310Packages.python-vlc python310Packages.pytmx python310Packages.tensorflow-datasets python311Packages.aigpy python311Packages.moderngl-window python311Packages.mpv python311Packages.pydub python311Packages.pyglet python311Packages.python-vlc python311Packages.pytmx qimgv radioboat reaper restream somafm-cli strawberry stremio sublime-music subtitleedit sunshine tidal-dl tone video-trimmer vlc vokoscreen wtwitch ytfzf 2 packages built: ffmpeg_4-full libplacebo Maintainer pings cc @primeos @tadeokondrak for testing. Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/project/libplacebo/versions. meta.description for libplacebo is: Reusable library for GPU-accelerated video/image rendering primitives meta.homepage for libplacebo is: https://code.videolan.org/videolan/libplacebo meta.changelog for libplacebo is: https://code.videolan.org/videolan/libplacebo/-/tags/v6.292.1 Updates performed Version update To inspect upstream changes Impact Checks done (click to expand) built on NixOS The tests defined in passthru.tests, if any, passed found 6.292.1 with grep in /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1 found 6.292.1 in filename of file in /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1 Rebuild report (if merged into master) (click to expand) 149 total rebuild path(s) 149 package rebuild(s) First fifty rebuilds by attrpath MIDIVisualizer adl ani-cli anime-downloader anki arcanPackages.all-wrapped arcanPackages.arcan arcanPackages.arcan-wrapped arcanPackages.cat9-wrapped arcanPackages.durden-wrapped arcanPackages.ffmpeg arcanPackages.pipeworld-wrapped arcanPackages.prio-wrapped arcanPackages.xarcan audiobookshelf celluloid corrscope cplay-ng curseradio deepin.dde-gsettings-schemas deepin.deepin-movie-reborn deepin.deepin-music deepin.deepin-voice-note dmlive dra-cla eaglemode feishin ff2mpv ffcast ffmpeg-full ffmpeg_4-full ffmpeg_5-full ffmpeg_6-full gonic handbrake haruna hydrus hypnotix imagination jellyfin jellyfin-ffmpeg jellyfin-media-player jellyfin-mpv-shim jftui kaffeine klipperscreen kphotoalbum libplacebo libsForQt5.elisa libsForQt5.kdenlive Instructions to test this update (click to expand) Either download from Cachix: nix-store -r /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted. Or, build yourself: nix-build -A libplacebo https://github.com/r-ryantm/nixpkgs/archive/29b436348a8ca87d2221d8cd39b32557629c6996.tar.gz After you've downloaded or built it, look at the files and if there are any, run the binaries: ls -la /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1 ls -la /nix/store/kc2bqdndr3fq07qnc56zvy2ppwq655za-libplacebo-6.292.1/bin Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch. Result of nixpkgs-review run on x86_64-linux 1 4 packages marked as broken and skipped: manim obs-studio-plugins.obs-hyperion python310Packages.moderngl-window python311Packages.moderngl-window 91 packages failed to build: MIDIVisualizer arcanPackages.all-wrapped arcanPackages.arcan arcanPackages.arcan-wrapped arcanPackages.cat9-wrapped arcanPackages.durden-wrapped arcanPackages.ffmpeg arcanPackages.pipeworld-wrapped arcanPackages.prio-wrapped arcanPackages.xarcan audiobookshelf corrscope deepin.deepin-music deepin.deepin-voice-note eaglemode ffcast ffmpeg_6-full gonic handbrake haruna imagination jellyfin jellyfin-ffmpeg kaffeine kphotoalbum libsForQt5.elisa libsForQt5.kdenlive libsForQt5.phonon-backend-vlc libsForQt5.soundkonverter libvlc liquidsoap megaglest minitube obs-studio obs-studio-plugins.advanced-scene-switcher obs-studio-plugins.droidcam-obs obs-studio-plugins.input-overlay obs-studio-plugins.looking-glass-obs obs-studio-plugins.obs-3d-effect obs-studio-plugins.obs-backgroundremoval obs-studio-plugins.obs-command-source obs-studio-plugins.obs-gradient-source obs-studio-plugins.obs-gstreamer obs-studio-plugins.obs-livesplit-one obs-studio-plugins.obs-move-transition obs-studio-plugins.obs-multi-rtmp obs-studio-plugins.obs-mute-filter obs-studio-plugins.obs-ndi obs-studio-plugins.obs-nvfbc obs-studio-plugins.obs-pipewire-audio-capture obs-studio-plugins.obs-rgb-levels-filter obs-studio-plugins.obs-scale-to-sound obs-studio-plugins.obs-shaderfilter obs-studio-plugins.obs-source-clone obs-studio-plugins.obs-source-record obs-studio-plugins.obs-source-switcher obs-studio-plugins.obs-teleport obs-studio-plugins.obs-text-pthread obs-studio-plugins.obs-transition-table obs-studio-plugins.obs-tuna obs-studio-plugins.obs-vaapi obs-studio-plugins.obs-vertical-canvas obs-studio-plugins.obs-vintage-filter obs-studio-plugins.obs-vkcapture obs-studio-plugins.obs-websocket obs-studio-plugins.waveform obs-studio-plugins.wlrobs peek printrun pympress python310Packages.aigpy python310Packages.pydub python310Packages.pyglet python310Packages.python-vlc python310Packages.pytmx python311Packages.aigpy python311Packages.pydub python311Packages.pyglet python311Packages.python-vlc python311Packages.pytmx reaper restream rofi-screenshot strawberry sunshine tidal-dl tone video-trimmer vlc vokoscreen wtwitch 43 packages built: adl ani-cli anime-downloader anki celluloid cplay-ng curseradio deepin.dde-gsettings-schemas deepin.deepin-movie-reborn dmlive dra-cla feishin ff2mpv ffmpeg_4-full hydrus hypnotix jellyfin-media-player jellyfin-mpv-shim jftui klipperscreen libplacebo libsForQt5.plasmatube memento mnemosyne mpc-qt mpv mpv-unwrapped mpvScripts.inhibit-gnome mpvScripts.mpris mpvScripts.thumbfast mpvpaper plex-media-player plex-mpv-shim python310Packages.mpv python311Packages.mpv qimgv radioboat somafm-cli stremio sublime-music subtitleedit tomato-c ytfzf Maintainer pings cc @primeos @tadeokondrak for testing.
2025-04-01T06:37:18.954394
2023-08-26T15:39:00
1868148385
{ "authors": [ "fabaff", "matthiasbeyer" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2103", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/251619" }
gharchive/pull-request
python311Packages.griffe: 0.35.0 -> 0.35.1 Diff: https://github.com/mkdocstrings/griffe/compare/refs/tags/0.35.0...0.35.1 Changelog: https://github.com/mkdocstrings/griffe/blob/0.35.1/CHANGELOG.md Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 23.11 Release Notes (or backporting 23.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 251619 run on x86_64-linux 1 9 packages built: griffe (python310Packages.griffe) griffe.dist (python310Packages.griffe.dist) netbox python310Packages.mkdocstrings-python python310Packages.mkdocstrings-python.dist python311Packages.griffe python311Packages.griffe.dist python311Packages.mkdocstrings-python python311Packages.mkdocstrings-python.dist Result of nixpkgs-review pr 251619 run on x86_64-linux 1 1 package marked as broken and skipped: netbox_3_3 9 packages built: griffe (python310Packages.griffe) griffe.dist (python310Packages.griffe.dist) netbox python310Packages.mkdocstrings-python python310Packages.mkdocstrings-python.dist python311Packages.griffe python311Packages.griffe.dist python311Packages.mkdocstrings-python python311Packages.mkdocstrings-python.dist
2025-04-01T06:37:18.964289
2023-10-08T07:36:04
1931688145
{ "authors": [ "fabaff" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2104", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/259722" }
gharchive/pull-request
python311Packages.google-generativeai: 0.1.0 -> 0.2.1 Diff: https://github.com/google/generative-ai-python/compare/refs/tags/v0.1.0...v0.2.1 Changelog: https://github.com/google/generative-ai-python/releases/tag/v0.2.1 Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 23.11 Release Notes (or backporting 23.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Result of nixpkgs-review pr 259722 run on x86_64-linux 1 5 packages built: home-assistant-component-tests.google_generative_ai_conversation python310Packages.google-generativeai python310Packages.google-generativeai.dist python311Packages.google-generativeai python311Packages.google-generativeai.dist
2025-04-01T06:37:18.973796
2023-10-17T13:29:32
1947440750
{ "authors": [ "bobby285271" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2105", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/261644" }
gharchive/pull-request
xfce.xfconf: 4.18.1 -> 4.18.2 https://gitlab.xfce.org/xfce/xfconf/-/compare/xfconf-4.18.1...xfconf-4.18.2 Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 23.11 Release Notes (or backporting 23.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. @ofborg test xfce
2025-04-01T06:37:18.982523
2023-10-18T13:12:01
1949721841
{ "authors": [ "DanielSidhion", "nrabulinski" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2106", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/261828" }
gharchive/pull-request
alpine-make-rootfs: init Description of changes alpine-make-rootfs is a tool a bit similar to the already-packaged alpine-make-vm-image. Instead of creating a full vm image, it only creates an Alpine Linux rootfs. I've been using this already on my own projects, thought I'd package it to make it easy for others to use it as well. Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin [ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual) [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [x] Tested basic functionality of all binary files (usually in ./result/bin/) 23.11 Release Notes (or backporting 23.05 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [x] Fits CONTRIBUTING.md. Since it's a new package and it doesn't need any overrides, wouldn't it be better to put in in by-name?
2025-04-01T06:37:18.993919
2023-12-10T21:36:51
2034543797
{ "authors": [ "nixos-discourse", "quantenzitrone" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2107", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/273418" }
gharchive/pull-request
i3-open-next-ws: init at 0.1.5 Description of changes Things done Built on platform(s) [x] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual) [x] sandbox = relaxed [ ] sandbox = true [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [x] Tested basic functionality of all binary files (usually in ./result/bin/) 24.05 Release Notes (or backporting 23.05 and 23.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [x] Fits CONTRIBUTING.md. Add a :+1: reaction to pull requests you find important. Result of nixpkgs-review pr 273418 run on x86_64-linux 1 1 package built: i3-open-next-ws just changes to the meta attributes This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/prs-ready-for-review/3032/3078
2025-04-01T06:37:19.006008
2023-12-16T11:20:59
2044713093
{ "authors": [ "fabaff" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2108", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/274697" }
gharchive/pull-request
restish: 0.19.0 -> 0.20.0 Diff: https://github.com/danielgtaylor/restish/compare/refs/tags/v0.19.0...v0.20.0 Changelog: https://github.com/danielgtaylor/restish/releases/tag/v0.20.0 Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual) [ ] sandbox = relaxed [ ] sandbox = true [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 24.05 Release Notes (or backporting 23.05 and 23.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Add a :+1: reaction to pull requests you find important. Result of nixpkgs-review pr 274697 run on x86_64-linux 1 1 package built: restish
2025-04-01T06:37:19.019726
2024-01-08T21:45:29
2071274111
{ "authors": [ "fabaff" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2109", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/279692" }
gharchive/pull-request
python311Packages.pymeteoclimatic: 0.0.6 -> 0.1.0 Diff: https://github.com/adrianmo/pymeteoclimatic/compare/0.0.6...0.1.0 Changelog: https://github.com/adrianmo/pymeteoclimatic/releases/tag/0.1.0 Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual) [ ] sandbox = relaxed [ ] sandbox = true [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 24.05 Release Notes (or backporting 23.05 and 23.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Add a :+1: reaction to pull requests you find important.
2025-04-01T06:37:19.029973
2024-01-16T21:11:34
2084942216
{ "authors": [ "prusnak" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2110", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/281398" }
gharchive/pull-request
electrum: 4.4.6 -> 4.5.0 Description of changes version update - https://github.com/spesmilo/electrum/blob/master/RELEASE-NOTES Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [x] aarch64-darwin For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual) [ ] sandbox = relaxed [ ] sandbox = true [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 24.05 Release Notes (or backporting 23.05 and 23.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Add a :+1: reaction to pull requests you find important. @GrahamcOfBorg build electrum
2025-04-01T06:37:19.052119
2024-01-21T10:16:02
2092519043
{ "authors": [ "fabaff" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2111", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/282544" }
gharchive/pull-request
python312Packages.overrides: 7.4.0 -> 7.6.0 Diff: https://github.com/mkorpela/overrides/compare/refs/tags/7.4.0...7.6.0 Changelog: https://github.com/mkorpela/overrides/releases/tag/7.6.0 Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual) [ ] sandbox = relaxed [ ] sandbox = true [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 24.05 Release Notes (or backporting 23.05 and 23.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [ ] Fits CONTRIBUTING.md. Add a :+1: reaction to pull requests you find important. Result of nixpkgs-review pr 282544 run on x86_64-linux 1 8 packages marked as broken and skipped: python311Packages.elegy python311Packages.elegy.dist python311Packages.jupyter-contrib-nbextensions python311Packages.jupyter-contrib-nbextensions.dist python311Packages.openllm python311Packages.openllm.dist python311Packages.treex python311Packages.treex.dist 25 packages failed to build: python311Packages.arviz python311Packages.arviz.dist python311Packages.augmax python311Packages.augmax.dist python311Packages.bambi python311Packages.bambi.dist python311Packages.jupyterlab-git python311Packages.jupyterlab-git.dist python311Packages.layoutparser python311Packages.layoutparser.dist python311Packages.nbdime python311Packages.nbdime.dist python311Packages.nikola python311Packages.nikola.dist python311Packages.oauthenticator python311Packages.oauthenticator.dist python311Packages.pdfplumber python311Packages.pdfplumber.dist python311Packages.pymc python311Packages.pymc.dist python312Packages.qiling python312Packages.qiling.dist tts tts.dist wolfram-notebook 130 packages built: cantor (libsForQt5.cantor ,plasma5Packages.cantor) ihaskell jupyter jupyter-all labplot manim manim.dist nbqa nbqa.dist python311Packages.ansible-kernel python311Packages.ansible-kernel.dist python311Packages.batchspawner python311Packages.batchspawner.dist python311Packages.bqplot python311Packages.bqplot.dist python311Packages.bqscales python311Packages.bqscales.dist python311Packages.dalle-mini python311Packages.dalle-mini.dist python311Packages.distrax python311Packages.distrax.dist python311Packages.dm-haiku python311Packages.dm-haiku.dist python311Packages.dockerspawner python311Packages.dockerspawner.dist python311Packages.einops python311Packages.einops.dist python311Packages.encodec python311Packages.encodec.dist python311Packages.experiment-utilities python311Packages.experiment-utilities.dist python311Packages.flax python311Packages.flax.dist python311Packages.ipytablewidgets python311Packages.ipytablewidgets.dist python311Packages.jupyter python311Packages.jupyter-collaboration python311Packages.jupyter-collaboration.dist python311Packages.jupyter-contrib-core python311Packages.jupyter-contrib-core.dist python311Packages.jupyter-lsp python311Packages.jupyter-lsp.dist python311Packages.jupyter-nbextensions-configurator python311Packages.jupyter-nbextensions-configurator.dist python311Packages.jupyter-server python311Packages.jupyter-server-fileid python311Packages.jupyter-server-fileid.dist python311Packages.jupyter-server-mathjax python311Packages.jupyter-server-mathjax.dist python311Packages.jupyter-server.dist python311Packages.jupyter.dist python311Packages.jupyterhub python311Packages.jupyterhub-ldapauthenticator python311Packages.jupyterhub-ldapauthenticator.dist python311Packages.jupyterhub-systemdspawner python311Packages.jupyterhub-systemdspawner.dist python311Packages.jupyterhub-tmpauthenticator python311Packages.jupyterhub-tmpauthenticator.dist python311Packages.jupyterhub.dist python311Packages.jupyterlab python311Packages.jupyterlab-lsp python311Packages.jupyterlab-lsp.dist python311Packages.jupyterlab-server python311Packages.jupyterlab-server.dist python311Packages.jupyterlab.dist python311Packages.jupytext python311Packages.jupytext.dist python311Packages.k-diffusion python311Packages.k-diffusion.dist python311Packages.mkdocs-jupyter python311Packages.mkdocs-jupyter.dist python311Packages.nbclassic python311Packages.nbclassic.dist python311Packages.nbdev python311Packages.nbdev.dist python311Packages.nix-kernel python311Packages.nix-kernel.dist python311Packages.notebook python311Packages.notebook-shim python311Packages.notebook-shim.dist python311Packages.notebook.dist python311Packages.notedown python311Packages.notedown.dist python311Packages.overrides python311Packages.overrides.dist python311Packages.phik python311Packages.phik.dist python311Packages.pyarr python311Packages.pyarr.dist python311Packages.pydeck python311Packages.pydeck.dist python311Packages.pymoo python311Packages.pymoo.dist python311Packages.python-fx python311Packages.python-fx.dist python311Packages.qgrid python311Packages.qgrid.dist python311Packages.qiling python311Packages.qiling.dist python311Packages.rlax python311Packages.rlax.dist python311Packages.rotary-embedding-torch python311Packages.rotary-embedding-torch.dist streamlit (python311Packages.streamlit) streamlit.dist (python311Packages.streamlit.dist) python311Packages.tsfresh python311Packages.tsfresh.dist python311Packages.vector python311Packages.vector.dist python311Packages.vega python311Packages.vega.dist python311Packages.vqgan-jax python311Packages.vqgan-jax.dist python311Packages.xarray-einstats python311Packages.xarray-einstats.dist python312Packages.nbdev python312Packages.nbdev.dist python312Packages.overrides python312Packages.overrides.dist python312Packages.pyarr python312Packages.pyarr.dist python312Packages.python-fx python312Packages.python-fx.dist quarto rstudio rstudio-server rstudioServerWrapper rstudioWrapper sage sageWithDoc
2025-04-01T06:37:19.063680
2024-02-20T18:25:15
2145012952
{ "authors": [ "klinger", "ncfavier" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2112", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/290231" }
gharchive/pull-request
doc: added nvidiaLegacy driver version 470 to available options in nixos manual It is possible to install the nvidiaLegacy470 driver for the slightly outdated GPUs, but the documentation only has the hints how to install the drivers for the even older GPUs. Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual) [ ] sandbox = relaxed [ ] sandbox = true [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 24.05 Release Notes (or backporting 23.05 and 23.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [x] Fits CONTRIBUTING.md. Add a :+1: reaction to pull requests you find important. I don't understand this PR: were you actually able to enable the legacy nvidia drivers using nvidiaLegacy470? From what I understand, this option should cause an error to be thrown since https://github.com/NixOS/nixpkgs/pull/99323 (2020), and even that was removed in https://github.com/NixOS/nixpkgs/pull/244060 so now it does nothing. I'm proposing to update the docs in https://github.com/NixOS/nixpkgs/pull/298956
2025-04-01T06:37:19.073665
2024-03-06T13:11:23
2171481135
{ "authors": [ "toonn" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2113", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/293769" }
gharchive/pull-request
wire-desktop: mac 3.32.4589 -> 3.35.4861, linux 3.32.3079 -> 3.35.3348 Description of changes Things done Built on platform(s) [ ] x86_64-linux [ ] aarch64-linux [ ] x86_64-darwin [ ] aarch64-darwin For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual) [ ] sandbox = relaxed [ ] sandbox = true [ ] Tested, as applicable: NixOS test(s) (look inside nixos/tests) and/or package tests or, for functions and "core" functionality, tests in lib/tests or pkgs/test made sure NixOS tests are linked to the relevant packages [ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage [ ] Tested basic functionality of all binary files (usually in ./result/bin/) 24.05 Release Notes (or backporting 23.05 and 23.11 Release notes) [ ] (Package updates) Added a release notes entry if the change is major or breaking [ ] (Module updates) Added a release notes entry if the change is significant [ ] (Module addition) Added a release notes entry if adding a new NixOS module [x] Fits CONTRIBUTING.md. Add a :+1: reaction to pull requests you find important. This is the second time I've updated this version bump. I'll leave it for a bit longer but if no one's interested in reviewing I'll go ahead and self-merge this one.
2025-04-01T06:37:19.078870
2017-10-13T04:14:33
265165085
{ "authors": [ "adisbladis" ], "license": "MIT", "license_source": "github-api", "license_type": "permissive", "provenance": "gharchive-dolma-0000.json.gz:2114", "repo": "NixOS/nixpkgs", "url": "https://github.com/NixOS/nixpkgs/pull/30380" }
gharchive/pull-request
desktop-managers: Fix unsupported attribute 'xcfg' Motivation for this change After https://github.com/NixOS/nixpkgs/pull/30286 a nixos-rebuild results in: error: Module `/etc/nixos/nixpkgs/nixos/modules/services/x11/desktop-managers/default.nix' has an unsupported attribute `xcfg'. This is caused by assignments to the top-level attributes `config' or `options'. (use ‘--show-trace’ to show detailed location information) Things done [x] Tested using sandboxing (nix.useSandbox on NixOS, or option build-use-sandbox in nix.conf on non-NixOS) Built on platform(s) [x] NixOS [ ] macOS [ ] other Linux distributions [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests) [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip" [ ] Tested execution of all binary files (usually in ./result/bin/) [x] Fits CONTRIBUTING.md. Closing because of https://github.com/NixOS/nixpkgs/pull/30385